openSUSE Security Update : kernel (openSUSE-SU-2010:0655-1)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update of the openSUSE 11.3 kernel fixes two local root exploits,
various other security issues and some bugs.

Following security issues are fixed by this update: CVE-2010-3301:
Mismatch between 32bit and 64bit register usage in the system call
entry path could be used by local attackers to gain root privileges.
This problem only affects x86_64 kernels.

CVE-2010-3081: Incorrect buffer handling in the biarch-compat buffer
handling could be used by local attackers to gain root privileges.
This problem affects foremost x86_64, or potentially other biarch
platforms, like PowerPC and S390x.

CVE-2010-3084: A buffer overflow in the ETHTOOL_GRXCLSRLALL code could
be used to crash the kernel or potentially execute code.

CVE-2010-2955: A kernel information leak via the WEXT ioctl was fixed.

CVE-2010-2960: The keyctl_session_to_parent function in
security/keys/keyctl.c in the Linux kernel expects that a certain
parent session keyring exists, which allows local users to cause a
denial of service (NULL pointer dereference and system crash) or
possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT
argument to the keyctl function.

CVE-2010-3080: A double free in an alsa error path was fixed, which
could lead to kernel crashes.

CVE-2010-3079: Fixed a ftrace NULL pointer dereference problem which
could lead to kernel crashes.

CVE-2010-3298: Fixed a kernel information leak in the net/usb/hso
driver.

CVE-2010-3296: Fixed a kernel information leak in the cxgb3 driver.

CVE-2010-3297: Fixed a kernel information leak in the net/eql driver.

See also :

http://lists.opensuse.org/opensuse-updates/2010-09/msg00042.html
https://bugzilla.novell.com/show_bug.cgi?id=634637
https://bugzilla.novell.com/show_bug.cgi?id=635413
https://bugzilla.novell.com/show_bug.cgi?id=635425
https://bugzilla.novell.com/show_bug.cgi?id=637502
https://bugzilla.novell.com/show_bug.cgi?id=638274
https://bugzilla.novell.com/show_bug.cgi?id=638277
https://bugzilla.novell.com/show_bug.cgi?id=639481
https://bugzilla.novell.com/show_bug.cgi?id=639482
https://bugzilla.novell.com/show_bug.cgi?id=639483
https://bugzilla.novell.com/show_bug.cgi?id=639708
https://bugzilla.novell.com/show_bug.cgi?id=639709
https://bugzilla.novell.com/show_bug.cgi?id=639728

Solution :

Update the affected kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now