The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to 2.6.32.43 and fixes various bugs and security issues.
The following security issues were fixed :
The normal mmap paths all avoid creating a mapping where the pgoff inside the mapping could wrap around due to overflow. However, an expanding mremap() can take such a non-wrapping mapping and make it bigger and cause a wrapping condition. (CVE-2011-2496)
A local unprivileged user able to access a NFS filesystem could use file locking to deadlock parts of an nfs server under some circumstance. (CVE-2011-2491)
Fixed a race between ksmd and other memory management code, which could result in a NULL ptr dereference and kernel crash. (CVE-2011-2183)
In both trigger_scan and sched_scan operations, we were checking for the SSID length before assigning the value correctly. Since the memory was just kzalloced, the check was always failing and SSID with over 32 characters were allowed to go through. This required CAP_NET_ADMIN privileges to be exploited.
(CVE-2011-2517)
A malicious user or buggy application could inject diagnosing byte code and trigger an infinite loop in inet_diag_bc_audit(). (CVE-2011-2213)
The code for evaluating LDM partitions (in fs/partitions/ldm.c) contained bugs that could crash the kernel for certain corrupted LDM partitions.
(CVE-2011-1017 / CVE-2011-1012 / CVE-2011-2182)
Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel allowed local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
(CVE-2011-1593)
The proc filesystem implementation in the Linux kernel did not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allowed local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls. (CVE-2011-1020)
When using a setuid root mount.cifs, local users could hijack password protected mounted CIFS shares of other local users. (CVE-2011-1585)
Kernel information via the TPM devices could by used by local attackers to read kernel memory. (CVE-2011-1160)
The Linux kernel automatically evaluated partition tables of storage devices. The code for evaluating EFI GUID partitions (in fs/partitions/efi.c) contained a bug that causes a kernel oops on certain corrupted GUID partition tables, which might be used by local attackers to crash the kernel or potentially execute code.
(CVE-2011-1577)
In a bluetooth ioctl, struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo was copied to userspace with this uninizialized one byte, leading to an old stack contents leak. (CVE-2011-1078)
In a bluetooth ioctl, struct ca is copied from userspace. It was not checked whether the ‘device’ field was NULL terminated. This potentially leads to BUG() inside of alloc_netdev_mqs() and/or information leak by creating a device with a name made of contents of kernel stack. (CVE-2011-1079)
In ebtables rule loading, struct tmp is copied from userspace. It was not checked whether the ‘name’ field is NULL terminated. This may have lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen by all userspace processes. (CVE-2011-1080)
The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel on the x86_64 platform allowed remote attackers to obtain potentially sensitive information from kernel stack memory by reading uninitialized data in the ah field of an Acorn Universal Networking (AUN) packet. (CVE-2011-1173)
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel did not place the expected ‘0’ character at the end of string data in the values of certain structure members, which allowed local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
(CVE-2011-1170)
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel did not place the expected ‘0’ character at the end of string data in the values of certain structure members, which allowed local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
(CVE-2011-1171)
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel did not place the expected ‘0’ character at the end of string data in the values of certain structure members, which allowed local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
(CVE-2011-1172)
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before allowed local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages. (CVE-2011-1746)
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call. (CVE-2011-1745)
The bcm_release function in net/can/bcm.c in the Linux kernel did not properly validate a socket data structure, which allowed local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation. (CVE-2011-1598)
The raw_release function in net/can/raw.c in the Linux kernel did not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation. (CVE-2011-1748)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SuSE 11 update information. The text itself is
# copyright (C) Novell, Inc.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(55686);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2011-1012", "CVE-2011-1017", "CVE-2011-1020", "CVE-2011-1078", "CVE-2011-1079", "CVE-2011-1080", "CVE-2011-1160", "CVE-2011-1170", "CVE-2011-1171", "CVE-2011-1172", "CVE-2011-1173", "CVE-2011-1577", "CVE-2011-1585", "CVE-2011-1593", "CVE-2011-1598", "CVE-2011-1745", "CVE-2011-1746", "CVE-2011-1748", "CVE-2011-2182", "CVE-2011-2183", "CVE-2011-2213", "CVE-2011-2491", "CVE-2011-2496", "CVE-2011-2517");
script_name(english:"SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 4884 / 4888 / 4889)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote SuSE 11 host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to
2.6.32.43 and fixes various bugs and security issues.
The following security issues were fixed :
- The normal mmap paths all avoid creating a mapping where
the pgoff inside the mapping could wrap around due to
overflow. However, an expanding mremap() can take such a
non-wrapping mapping and make it bigger and cause a
wrapping condition. (CVE-2011-2496)
- A local unprivileged user able to access a NFS
filesystem could use file locking to deadlock parts of
an nfs server under some circumstance. (CVE-2011-2491)
- Fixed a race between ksmd and other memory management
code, which could result in a NULL ptr dereference and
kernel crash. (CVE-2011-2183)
- In both trigger_scan and sched_scan operations, we were
checking for the SSID length before assigning the value
correctly. Since the memory was just kzalloced, the
check was always failing and SSID with over 32
characters were allowed to go through. This required
CAP_NET_ADMIN privileges to be exploited.
(CVE-2011-2517)
- A malicious user or buggy application could inject
diagnosing byte code and trigger an infinite loop in
inet_diag_bc_audit(). (CVE-2011-2213)
- The code for evaluating LDM partitions (in
fs/partitions/ldm.c) contained bugs that could crash the
kernel for certain corrupted LDM partitions.
(CVE-2011-1017 / CVE-2011-1012 / CVE-2011-2182)
- Multiple integer overflows in the next_pidmap function
in kernel/pid.c in the Linux kernel allowed local users
to cause a denial of service (system crash) via a
crafted (1) getdents or (2) readdir system call.
(CVE-2011-1593)
- The proc filesystem implementation in the Linux kernel
did not restrict access to the /proc directory tree of a
process after this process performs an exec of a setuid
program, which allowed local users to obtain sensitive
information or cause a denial of service via open,
lseek, read, and write system calls. (CVE-2011-1020)
- When using a setuid root mount.cifs, local users could
hijack password protected mounted CIFS shares of other
local users. (CVE-2011-1585)
- Kernel information via the TPM devices could by used by
local attackers to read kernel memory. (CVE-2011-1160)
- The Linux kernel automatically evaluated partition
tables of storage devices. The code for evaluating EFI
GUID partitions (in fs/partitions/efi.c) contained a bug
that causes a kernel oops on certain corrupted GUID
partition tables, which might be used by local attackers
to crash the kernel or potentially execute code.
(CVE-2011-1577)
- In a bluetooth ioctl, struct sco_conninfo has one
padding byte in the end. Local variable cinfo of type
sco_conninfo was copied to userspace with this
uninizialized one byte, leading to an old stack contents
leak. (CVE-2011-1078)
- In a bluetooth ioctl, struct ca is copied from
userspace. It was not checked whether the 'device' field
was NULL terminated. This potentially leads to BUG()
inside of alloc_netdev_mqs() and/or information leak by
creating a device with a name made of contents of kernel
stack. (CVE-2011-1079)
- In ebtables rule loading, struct tmp is copied from
userspace. It was not checked whether the 'name' field
is NULL terminated. This may have lead to buffer
overflow and passing contents of kernel stack as a
module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen
by all userspace processes. (CVE-2011-1080)
- The econet_sendmsg function in net/econet/af_econet.c in
the Linux kernel on the x86_64 platform allowed remote
attackers to obtain potentially sensitive information
from kernel stack memory by reading uninitialized data
in the ah field of an Acorn Universal Networking (AUN)
packet. (CVE-2011-1173)
- net/ipv4/netfilter/arp_tables.c in the IPv4
implementation in the Linux kernel did not place the
expected '0' character at the end of string data in the
values of certain structure members, which allowed local
users to obtain potentially sensitive information from
kernel memory by leveraging the CAP_NET_ADMIN capability
to issue a crafted request, and then reading the
argument to the resulting modprobe process.
(CVE-2011-1170)
- net/ipv4/netfilter/ip_tables.c in the IPv4
implementation in the Linux kernel did not place the
expected '0' character at the end of string data in the
values of certain structure members, which allowed local
users to obtain potentially sensitive information from
kernel memory by leveraging the CAP_NET_ADMIN capability
to issue a crafted request, and then reading the
argument to the resulting modprobe process.
(CVE-2011-1171)
- net/ipv6/netfilter/ip6_tables.c in the IPv6
implementation in the Linux kernel did not place the
expected '0' character at the end of string data in the
values of certain structure members, which allowed local
users to obtain potentially sensitive information from
kernel memory by leveraging the CAP_NET_ADMIN capability
to issue a crafted request, and then reading the
argument to the resulting modprobe process.
(CVE-2011-1172)
- Multiple integer overflows in the (1)
agp_allocate_memory and (2) agp_create_user_memory
functions in drivers/char/agp/generic.c in the Linux
kernel before allowed local users to trigger buffer
overflows, and consequently cause a denial of service
(system crash) or possibly have unspecified other
impact, via vectors related to calls that specify a
large number of memory pages. (CVE-2011-1746)
- Integer overflow in the agp_generic_insert_memory
function in drivers/char/agp/generic.c in the Linux
kernel allowed local users to gain privileges or cause a
denial of service (system crash) via a crafted
AGPIOC_BIND agp_ioctl ioctl call. (CVE-2011-1745)
- The bcm_release function in net/can/bcm.c in the Linux
kernel did not properly validate a socket data
structure, which allowed local users to cause a denial
of service (NULL pointer dereference) or possibly have
unspecified other impact via a crafted release
operation. (CVE-2011-1598)
- The raw_release function in net/can/raw.c in the Linux
kernel did not properly validate a socket data
structure, which allows local users to cause a denial of
service (NULL pointer dereference) or possibly have
unspecified other impact via a crafted release
operation. (CVE-2011-1748)"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=466279"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=584493"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=626119"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=638985"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=649000"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=650545"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=653850"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=654501"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=655973"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=662432"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=663513"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=666423"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=667226"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=668483"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=668927"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=669889"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=670465"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=670816"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=670868"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=674648"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=674982"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=676601"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=676602"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=677443"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=677563"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=678728"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=680040"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=680845"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=681180"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=681181"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=681182"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=681185"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=681186"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=681639"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=682076"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=682251"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=682319"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=682482"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=682567"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=683107"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=683282"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=684297"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=684472"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=684852"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=684927"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=685226"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=685276"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=686325"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=686404"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=686412"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=686921"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=686980"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=687113"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=687478"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=687759"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=687760"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=687789"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=688326"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=688432"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=688685"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=689041"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=689290"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=689596"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=689746"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=689797"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=690683"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691216"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691269"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691408"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691536"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691538"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691632"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691633"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691693"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=691829"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=692343"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=692454"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=692459"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=692460"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=692502"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=693013"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=693149"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=693374"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=693382"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=693636"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=696107"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=696586"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=697181"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=697901"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=698221"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=698247"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=698604"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=699946"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=700401"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=700879"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=701170"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=701622"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=701977"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=702013"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=702285"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=703013"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=703410"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=703490"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=703786"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1012.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1017.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1020.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1078.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1079.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1080.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1160.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1170.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1171.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1172.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1173.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1577.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1585.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1593.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1598.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1745.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1746.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-1748.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2182.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2183.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2213.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2491.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2496.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2011-2517.html"
);
script_set_attribute(
attribute:"solution",
value:"Apply SAT patch number 4884 / 4888 / 4889 as appropriate."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-default-man");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-ec2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-ec2-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-pae-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-trace");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-trace-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-trace-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:kernel-xen-extra");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_set_attribute(attribute:"patch_publication_date", value:"2011/07/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/07/26");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
pl = get_kb_item("Host/SuSE/patchlevel");
if (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, "SuSE 11.1");
flag = 0;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"btrfs-kmp-default-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"btrfs-kmp-pae-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"btrfs-kmp-xen-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"hyper-v-kmp-default-0_2.6.32.43_0.4-0.14.8")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"hyper-v-kmp-pae-0_2.6.32.43_0.4-0.14.8")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-default-extra-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-desktop-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-pae-extra-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-source-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-syms-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"kernel-xen-extra-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"btrfs-kmp-default-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"btrfs-kmp-xen-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"hyper-v-kmp-default-0_2.6.32.43_0.4-0.14.8")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-default-extra-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-desktop-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-source-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-syms-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"kernel-xen-extra-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"btrfs-kmp-default-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"ext4dev-kmp-default-0_2.6.32.43_0.4-7.9.17")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-default-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-default-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-default-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-source-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-syms-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-trace-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-trace-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, reference:"kernel-trace-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"btrfs-kmp-pae-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"btrfs-kmp-xen-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"ext4dev-kmp-pae-0_2.6.32.43_0.4-7.9.17")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"ext4dev-kmp-xen-0_2.6.32.43_0.4-7.9.17")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"hyper-v-kmp-default-0_2.6.32.43_0.4-0.14.8")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"hyper-v-kmp-pae-0_2.6.32.43_0.4-0.14.8")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-ec2-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-ec2-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-pae-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-pae-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-pae-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-xen-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-xen-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"i586", reference:"kernel-xen-devel-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"kernel-default-man-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"btrfs-kmp-xen-0_2.6.32.43_0.4-0.3.50")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"ext4dev-kmp-xen-0_2.6.32.43_0.4-7.9.17")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"hyper-v-kmp-default-0_2.6.32.43_0.4-0.14.8")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-ec2-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-ec2-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-xen-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-xen-base-2.6.32.43-0.4.1")) flag++;
if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"kernel-xen-devel-2.6.32.43-0.4.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1012
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1080
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1170
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1171
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1172
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1585
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2183
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2496
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2517
support.novell.com/security/cve/CVE-2011-1012.html
support.novell.com/security/cve/CVE-2011-1017.html
support.novell.com/security/cve/CVE-2011-1020.html
support.novell.com/security/cve/CVE-2011-1078.html
support.novell.com/security/cve/CVE-2011-1079.html
support.novell.com/security/cve/CVE-2011-1080.html
support.novell.com/security/cve/CVE-2011-1160.html
support.novell.com/security/cve/CVE-2011-1170.html
support.novell.com/security/cve/CVE-2011-1171.html
support.novell.com/security/cve/CVE-2011-1172.html
support.novell.com/security/cve/CVE-2011-1173.html
support.novell.com/security/cve/CVE-2011-1577.html
support.novell.com/security/cve/CVE-2011-1585.html
support.novell.com/security/cve/CVE-2011-1593.html
support.novell.com/security/cve/CVE-2011-1598.html
support.novell.com/security/cve/CVE-2011-1745.html
support.novell.com/security/cve/CVE-2011-1746.html
support.novell.com/security/cve/CVE-2011-1748.html
support.novell.com/security/cve/CVE-2011-2182.html
support.novell.com/security/cve/CVE-2011-2183.html
support.novell.com/security/cve/CVE-2011-2213.html
support.novell.com/security/cve/CVE-2011-2491.html
support.novell.com/security/cve/CVE-2011-2496.html
support.novell.com/security/cve/CVE-2011-2517.html
bugzilla.novell.com/show_bug.cgi?id=466279
bugzilla.novell.com/show_bug.cgi?id=584493
bugzilla.novell.com/show_bug.cgi?id=626119
bugzilla.novell.com/show_bug.cgi?id=638985
bugzilla.novell.com/show_bug.cgi?id=649000
bugzilla.novell.com/show_bug.cgi?id=650545
bugzilla.novell.com/show_bug.cgi?id=653850
bugzilla.novell.com/show_bug.cgi?id=654501
bugzilla.novell.com/show_bug.cgi?id=655973
bugzilla.novell.com/show_bug.cgi?id=662432
bugzilla.novell.com/show_bug.cgi?id=663513
bugzilla.novell.com/show_bug.cgi?id=666423
bugzilla.novell.com/show_bug.cgi?id=667226
bugzilla.novell.com/show_bug.cgi?id=668483
bugzilla.novell.com/show_bug.cgi?id=668927
bugzilla.novell.com/show_bug.cgi?id=669889
bugzilla.novell.com/show_bug.cgi?id=670465
bugzilla.novell.com/show_bug.cgi?id=670816
bugzilla.novell.com/show_bug.cgi?id=670868
bugzilla.novell.com/show_bug.cgi?id=674648
bugzilla.novell.com/show_bug.cgi?id=674982
bugzilla.novell.com/show_bug.cgi?id=676601
bugzilla.novell.com/show_bug.cgi?id=676602
bugzilla.novell.com/show_bug.cgi?id=677443
bugzilla.novell.com/show_bug.cgi?id=677563
bugzilla.novell.com/show_bug.cgi?id=678728
bugzilla.novell.com/show_bug.cgi?id=680040
bugzilla.novell.com/show_bug.cgi?id=680845
bugzilla.novell.com/show_bug.cgi?id=681180
bugzilla.novell.com/show_bug.cgi?id=681181
bugzilla.novell.com/show_bug.cgi?id=681182
bugzilla.novell.com/show_bug.cgi?id=681185
bugzilla.novell.com/show_bug.cgi?id=681186
bugzilla.novell.com/show_bug.cgi?id=681639
bugzilla.novell.com/show_bug.cgi?id=682076
bugzilla.novell.com/show_bug.cgi?id=682251
bugzilla.novell.com/show_bug.cgi?id=682319
bugzilla.novell.com/show_bug.cgi?id=682482
bugzilla.novell.com/show_bug.cgi?id=682567
bugzilla.novell.com/show_bug.cgi?id=683107
bugzilla.novell.com/show_bug.cgi?id=683282
bugzilla.novell.com/show_bug.cgi?id=684297
bugzilla.novell.com/show_bug.cgi?id=684472
bugzilla.novell.com/show_bug.cgi?id=684852
bugzilla.novell.com/show_bug.cgi?id=684927
bugzilla.novell.com/show_bug.cgi?id=685226
bugzilla.novell.com/show_bug.cgi?id=685276
bugzilla.novell.com/show_bug.cgi?id=686325
bugzilla.novell.com/show_bug.cgi?id=686404
bugzilla.novell.com/show_bug.cgi?id=686412
bugzilla.novell.com/show_bug.cgi?id=686921
bugzilla.novell.com/show_bug.cgi?id=686980
bugzilla.novell.com/show_bug.cgi?id=687113
bugzilla.novell.com/show_bug.cgi?id=687478
bugzilla.novell.com/show_bug.cgi?id=687759
bugzilla.novell.com/show_bug.cgi?id=687760
bugzilla.novell.com/show_bug.cgi?id=687789
bugzilla.novell.com/show_bug.cgi?id=688326
bugzilla.novell.com/show_bug.cgi?id=688432
bugzilla.novell.com/show_bug.cgi?id=688685
bugzilla.novell.com/show_bug.cgi?id=689041
bugzilla.novell.com/show_bug.cgi?id=689290
bugzilla.novell.com/show_bug.cgi?id=689596
bugzilla.novell.com/show_bug.cgi?id=689746
bugzilla.novell.com/show_bug.cgi?id=689797
bugzilla.novell.com/show_bug.cgi?id=690683
bugzilla.novell.com/show_bug.cgi?id=691216
bugzilla.novell.com/show_bug.cgi?id=691269
bugzilla.novell.com/show_bug.cgi?id=691408
bugzilla.novell.com/show_bug.cgi?id=691536
bugzilla.novell.com/show_bug.cgi?id=691538
bugzilla.novell.com/show_bug.cgi?id=691632
bugzilla.novell.com/show_bug.cgi?id=691633
bugzilla.novell.com/show_bug.cgi?id=691693
bugzilla.novell.com/show_bug.cgi?id=691829
bugzilla.novell.com/show_bug.cgi?id=692343
bugzilla.novell.com/show_bug.cgi?id=692454
bugzilla.novell.com/show_bug.cgi?id=692459
bugzilla.novell.com/show_bug.cgi?id=692460
bugzilla.novell.com/show_bug.cgi?id=692502
bugzilla.novell.com/show_bug.cgi?id=693013
bugzilla.novell.com/show_bug.cgi?id=693149
bugzilla.novell.com/show_bug.cgi?id=693374
bugzilla.novell.com/show_bug.cgi?id=693382
bugzilla.novell.com/show_bug.cgi?id=693636
bugzilla.novell.com/show_bug.cgi?id=696107
bugzilla.novell.com/show_bug.cgi?id=696586
bugzilla.novell.com/show_bug.cgi?id=697181
bugzilla.novell.com/show_bug.cgi?id=697901
bugzilla.novell.com/show_bug.cgi?id=698221
bugzilla.novell.com/show_bug.cgi?id=698247
bugzilla.novell.com/show_bug.cgi?id=698604
bugzilla.novell.com/show_bug.cgi?id=699946
bugzilla.novell.com/show_bug.cgi?id=700401
bugzilla.novell.com/show_bug.cgi?id=700879
bugzilla.novell.com/show_bug.cgi?id=701170
bugzilla.novell.com/show_bug.cgi?id=701622
bugzilla.novell.com/show_bug.cgi?id=701977
bugzilla.novell.com/show_bug.cgi?id=702013
bugzilla.novell.com/show_bug.cgi?id=702285
bugzilla.novell.com/show_bug.cgi?id=703013
bugzilla.novell.com/show_bug.cgi?id=703410
bugzilla.novell.com/show_bug.cgi?id=703490
bugzilla.novell.com/show_bug.cgi?id=703786