openSUSE Security Update : Kernel (openSUSE-SU-2010:0592-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update of the openSUSE 11.3 kernel brings the kernel to version
2.6.34.4 and contains a lot of bug and security fixes

CVE-2010-3110: Missing bounds checks in several ioctls of the Novell
Client novfs /proc interface allowed unprivileged local users to crash
the kernel or even execute code in kernel context.

CVE-2010-2524: a malicious local user could fill the cache used by
CIFS do perform dns lookups with chosen data, therefore tricking the
kernel into mounting a wrong CIFS server.

CVE-2010-2798: a local user could trigger a NULL derefence on a gfs2
file system

CVE-2010-2537: a local user could overwrite append-only files on a
btrfs file system

CVE-2010-2538: a local user could read kernel memory of a btrfs file
system

See also :

http://lists.opensuse.org/opensuse-updates/2010-09/msg00009.html
https://bugzilla.novell.com/show_bug.cgi?id=529535
https://bugzilla.novell.com/show_bug.cgi?id=584720
https://bugzilla.novell.com/show_bug.cgi?id=586643
https://bugzilla.novell.com/show_bug.cgi?id=594362
https://bugzilla.novell.com/show_bug.cgi?id=599671
https://bugzilla.novell.com/show_bug.cgi?id=608300
https://bugzilla.novell.com/show_bug.cgi?id=610362
https://bugzilla.novell.com/show_bug.cgi?id=610828
https://bugzilla.novell.com/show_bug.cgi?id=615656
https://bugzilla.novell.com/show_bug.cgi?id=617530
https://bugzilla.novell.com/show_bug.cgi?id=617912
https://bugzilla.novell.com/show_bug.cgi?id=618678
https://bugzilla.novell.com/show_bug.cgi?id=619021
https://bugzilla.novell.com/show_bug.cgi?id=619416
https://bugzilla.novell.com/show_bug.cgi?id=619440
https://bugzilla.novell.com/show_bug.cgi?id=619727
https://bugzilla.novell.com/show_bug.cgi?id=621598
https://bugzilla.novell.com/show_bug.cgi?id=623005
https://bugzilla.novell.com/show_bug.cgi?id=623472
https://bugzilla.novell.com/show_bug.cgi?id=624118
https://bugzilla.novell.com/show_bug.cgi?id=624587
https://bugzilla.novell.com/show_bug.cgi?id=624606
https://bugzilla.novell.com/show_bug.cgi?id=624814
https://bugzilla.novell.com/show_bug.cgi?id=625339
https://bugzilla.novell.com/show_bug.cgi?id=627212
https://bugzilla.novell.com/show_bug.cgi?id=627310
https://bugzilla.novell.com/show_bug.cgi?id=627386
https://bugzilla.novell.com/show_bug.cgi?id=627447
https://bugzilla.novell.com/show_bug.cgi?id=629908
https://bugzilla.novell.com/show_bug.cgi?id=631066
https://bugzilla.novell.com/show_bug.cgi?id=631185
https://bugzilla.novell.com/show_bug.cgi?id=631319

Solution :

Update the affected Kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 75548 ()

Bugtraq ID:

CVE ID: CVE-2010-2524
CVE-2010-2537
CVE-2010-2538
CVE-2010-2798
CVE-2010-3110

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now