This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
This security update of the openSUSE 11.1 kernel fixes 3 critical
Following security bugs were fixed: CVE-2010-3301: Mismatch between
32bit and 64bit register usage in the system call entry path could be
used by local attackers to gain root privileges. This problem only
affects x86_64 kernels.
CVE-2010-3081: Incorrect buffer handling in the biarch-compat buffer
handling could be used by local attackers to gain root privileges.
This problem affects foremost x86_64, or potentially other biarch
platforms, like PowerPC and S390x.
CVE-2010-2959: Integer overflow in net/can/bcm.c in the Controller
Area Network (CAN) implementation in the Linux kernel allowed
attackers to execute arbitrary code or cause a denial of service
(system crash) via crafted CAN traffic.
See also :
Update the affected kernel packages.
Risk factor :
High / CVSS Base Score : 7.2
Public Exploit Available : true