openSUSE Security Update : kernel (openSUSE-SU-2010:0654-1)

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This security update of the openSUSE 11.1 kernel fixes 3 critical
security issues.

Following security bugs were fixed: CVE-2010-3301: Mismatch between
32bit and 64bit register usage in the system call entry path could be
used by local attackers to gain root privileges. This problem only
affects x86_64 kernels.

CVE-2010-3081: Incorrect buffer handling in the biarch-compat buffer
handling could be used by local attackers to gain root privileges.
This problem affects foremost x86_64, or potentially other biarch
platforms, like PowerPC and S390x.

CVE-2010-2959: Integer overflow in net/can/bcm.c in the Controller
Area Network (CAN) implementation in the Linux kernel allowed
attackers to execute arbitrary code or cause a denial of service
(system crash) via crafted CAN traffic.

See also :

http://lists.opensuse.org/opensuse-updates/2010-09/msg00041.html
https://bugzilla.novell.com/show_bug.cgi?id=633581
https://bugzilla.novell.com/show_bug.cgi?id=639708
https://bugzilla.novell.com/show_bug.cgi?id=639709

Solution :

Update the affected kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 49668 ()

Bugtraq ID:

CVE ID: CVE-2010-2959
CVE-2010-3081
CVE-2010-3301

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now