This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.
The remote SuSE 9 host is missing a security-related patch.
This updates the SUSE Linux Enterprise Server 9 kernel to fix various
security issues and some bugs.
The following security bugs were fixed :
- Incorrect buffer handling in the biarch-compat buffer
handling could be used by local attackers to gain root
privileges. This problem affects foremost x86_64, or
potentially other biarch platforms, like PowerPC and
- A kernel information leak via the WEXT ioctl was fixed.
- A kernel information leak via the XFS filesystem was
- A kernel information leak in the net eql code was fixed.
- The xfs_swapext function in fs/xfs/xfs_dfrag.c in the
Linux kernel did not properly check the file descriptors
passed to the SWAPEXT ioctl, which allowed local users
to leverage write access and obtain read access by
swapping one file into another file. (CVE-2010-2226)
- Fixed a kernel information leak in the net scheduler
- fs/cifs/cifssmb.c in the CIFS implementation in the
Linux kernel allowed remote attackers to cause a denial
of service (panic) via an SMB response packet with an
invalid CountHigh value, as demonstrated by a response
from an OS/2 server, related to the CIFSSMBWrite and
CIFSSMBWrite2 functions. (CVE-2010-2248)
Additionally a data corruption bug in s390 was fixed :
- A race between /proc/pid/stat and fork in the S390
kernel could lead to data corruption.
See also :
Apply YOU patch number 12646.
Risk factor :
High / CVSS Base Score : 7.8
Public Exploit Available : true
Family: SuSE Local Security Checks
Nessus Plugin ID: 49657 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now