This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote SuSE 11 host is missing one or more security updates.
This security update of the SUSE Linux Enterprise 11 GA kernel fixes 3
critical security issues.
Following security bugs were fixed :
- Mismatch between 32bit and 64bit register usage in the
system call entry path could be used by local attackers
to gain root privileges. This problem only affects
x86_64 kernels. (CVE-2010-3301)
- Incorrect buffer handling in the biarch-compat buffer
handling could be used by local attackers to gain root
privileges. This problem affects foremost x86_64, or
potentially other biarch platforms, like PowerPC and
- Integer overflow in net/can/bcm.c in the Controller Area
Network (CAN) implementation in the Linux kernel allowed
attackers to execute arbitrary code or cause a denial of
service (system crash) via crafted CAN traffic.
See also :
Apply SAT patch number 3164.
Risk factor :
High / CVSS Base Score : 7.2
Public Exploit Available : true