Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Patches » SUSE-2012:5723

Overview

Id SUSE-2012:5723
Name Novell SUSE 2012:5723 kernel security update for SLE 11 SP1 i586
Vendor Name novell
Product None
Content Type Critical Critical
Language(s)
Operating System(s) Linux 
Released On 29 Jan 2012 12:00:00

SUSE-2012:5723

Novell SUSE 2012:5723 kernel security update for SLE 11 SP1 i586

Vendor Name

novell

Product

None

Released On

29 Jan 2012 12:00:00

Url

http://support.novell.com

Description

LSAC(v2)
The SUSE Linux Enterprise 11 SP1 kernel has been updated to 2.6.32.54, fixing numerous bugs and security issues. The following security issues have been fixed: * A potential hypervisor escape by issuing SG_IO commands to partitiondevices was fixed by restricting access to these commands. ( CVE-2011-4127 ) * KEYS: Fix a NULL pointer deref in the user-defined key type, which allowed local attackers to Oops the kernel. (CVE-2011-4110 ) * Avoid potential NULL pointer deref in ghash, which allowed local attackers to Oops the kernel. (CVE-2011-4081 ) * Fixed a memory corruption possibility in xfs readlink, which could be used by local attackers to crash the system or potentially execute code by mounting a prepared xfs filesystem image. (CVE-2011-4077 ) * A overflow in the xfs acl handling was fixed that could be used by local attackers to crash the system or potentially execute code by mounting a prepared xfs filesystem image. (CVE-2012-0038 ) * A flaw in the ext3/ext4 filesystem allowed a local attacker to crash the kernel by getting a prepared ext3/ext4 filesystem mounted. ( CVE-2011-4132 ) * Access to the taskstats /proc file was restricted to avoid local attackers gaining knowledge of IO of other users (and so effecting side-channel attacks for e.g. guessing passwords by typing speed). ( CVE-2011-2494 ) * When using X.25 communication a malicious sender could corrupt data structures, causing crashes or potential code execution. Please note that X.25 needs to be setup to make this effective, which these days is usually not the case. (CVE-2010-3873 ) * When using X.25 communication a malicious sender could make the machine leak memory, causing crashes. Please note that X.25 needs to be setup to make this effective, which these days is usually not the case. (CVE-2010-4164 ) * A remote denial of service due to a NULL pointer dereference by using IPv6 fragments was fixed. (CVE-2011-2699 ) The following non-security issues have been fixed (excerpt from changelog): * elousb: Fixed bug in USB core API usage, code cleanup. * cifs: overhaul cifs_revalidate and rename to cifs_revalidate_dentry. * cifs: set server_eof in cifs_fattr_to_inode. * xfs: Fix missing xfs_iunlock() on error recovery path in xfs_readlink(). * Silence some warnings about ioctls on partitions. * netxen: Remove all references to unified firmware file. * bonding: send out gratuitous arps even with no address configured. * patches.fixes/ocfs2-serialize_unaligned_aio.patch: ocfs2: serialize unaligned aio. * patches.fixes/bonding-check-if-clients-MAC-addr-has-changed.patch: Update

Related Resources

Related Vulnerabilities

CVE-2010-4164   CVE-2010-3873   CVE-2011-2699   CVE-2011-2494   CVE-2011-4077   CVE-2011-4081   CVE-2011-4110   CVE-2011-4127   CVE-2011-4132   CVE-2012-0038  

Related Patches

None

Superseded Patches


Last Updated: 27 May 2016 11:12:34