This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote SuSE 10 host is missing a security-related patch.
This update fixes various bugs and some security issues in the SUSE
Linux Enterprise 10 SP 3 kernel.
The following security issues were fixed: CVE-2009-3238: The
get_random_int function in drivers/char/random.c in the Linux kernel
produces insufficiently random numbers, which allows attackers to
predict the return value, and possibly defeat protection mechanisms
based on randomization, via vectors that leverage the functions
tendency to return the same value over and over again for long
stretches of time.
- The (1) agp_generic_alloc_page and (2)
agp_generic_alloc_pages functions in
drivers/char/agp/generic.c in the agp subsystem in the
Linux kernel do not zero out pages that may later be
available to a user-space process, which allows local
users to obtain sensitive information by reading these
- Unsigned check in the ax25 socket handler could allow
local attackers to potentially crash the kernel or even
execute code. (CVE-2009-2909)
See also :
Apply ZYPP patch number 6637.
Risk factor :
High / CVSS Base Score : 7.8