openSUSE 10 Security Update : kernel (kernel-4986)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This kernel update fixes the following security problems :

- CVE-2008-0600: A local privilege escalation was found in
the vmsplice_pipe system call, which could be used by
local attackers to gain root access.

- CVE-2007-6206: Core dumps from root might be accessible
to the wrong owner.

And the following bugs (numbers are
references) :

- Update to minor kernel version

- networking bugfixes

- contains the following patches which were removed :

- patches.arch/acpica-psd.patch

- patches.fixes/invalid-semicolon

- patches.fixes/nopage-range-fix.patch

- patches.arch/acpi_thermal_blacklist_add_r50p.patch:
Avoid critical temp shutdowns on specific Thinkpad R50p

- Update config files. CONFIG_USB_DEBUG in debug kernel

- patches.rt/megasas_IRQF_NODELAY.patch: Convert megaraid
sas IRQ to non-threaded IRQ (337489).

- patches.drivers/libata-implement-force-parameter added
to series.conf.

- patches.xen/xen3-fixup-arch-i386: xen3 i386 build fixes.

- patches.xen/xenfb-module-param: Re: Patching Xen virtual

See also :

Solution :

Update the affected kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 31089 ()

Bugtraq ID:

CVE ID: CVE-2007-6206

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now