SuSE 10 Security Update : the Linux kernel (ZYPP Patch Number 7160)

High Nessus Plugin ID 49874

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.9

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

This kernel update for the SUSE Linux Enterprise 10 SP3 kernel fixes several critical security issues.

The following security issues were fixed :

- Incorrect buffer handling in the biarch-compat buffer handling could be used by local attackers to gain root privileges. This problem affects foremost x86_64, or potentially other biarch platforms, like PowerPC and S390x. (CVE-2010-3081)

- A kernel information leak via the WEXT ioctl was fixed.
(CVE-2010-2955)

- A kernel information leak via the XFS filesystem was fixed. (CVE-2010-3078)

- A kernel information leak in the net eql code was fixed.
(CVE-2010-3297)

Additionally a data corruption bug in s390 was fixed :

- A race between /proc/pid/stat and fork in the S390 kernel could lead to data corruption.

Solution

Apply ZYPP patch number 7160.

See Also

http://support.novell.com/security/cve/CVE-2010-2955.html

http://support.novell.com/security/cve/CVE-2010-3078.html

http://support.novell.com/security/cve/CVE-2010-3081.html

http://support.novell.com/security/cve/CVE-2010-3297.html

Plugin Details

Severity: High

ID: 49874

File Name: suse_kernel-7160.nasl

Version: 1.14

Type: local

Agent: unix

Published: 2010/10/11

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 8.9

CVSS v2.0

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/09/20

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-2955, CVE-2010-3078, CVE-2010-3081, CVE-2010-3297