Language:
http://support.novell.com/security/cve/CVE-2010-2803.html
http://support.novell.com/security/cve/CVE-2010-2942.html
http://support.novell.com/security/cve/CVE-2010-2946.html
https://bugzilla.novell.com/show_bug.cgi?id=529535
https://bugzilla.novell.com/show_bug.cgi?id=577967
https://bugzilla.novell.com/show_bug.cgi?id=600579
https://bugzilla.novell.com/show_bug.cgi?id=602150
https://bugzilla.novell.com/show_bug.cgi?id=603464
https://bugzilla.novell.com/show_bug.cgi?id=609172
https://bugzilla.novell.com/show_bug.cgi?id=610828
https://bugzilla.novell.com/show_bug.cgi?id=611094
https://bugzilla.novell.com/show_bug.cgi?id=612009
https://bugzilla.novell.com/show_bug.cgi?id=613273
https://bugzilla.novell.com/show_bug.cgi?id=613330
https://bugzilla.novell.com/show_bug.cgi?id=614332
https://bugzilla.novell.com/show_bug.cgi?id=615557
https://bugzilla.novell.com/show_bug.cgi?id=616464
https://bugzilla.novell.com/show_bug.cgi?id=617464
https://bugzilla.novell.com/show_bug.cgi?id=618157
https://bugzilla.novell.com/show_bug.cgi?id=618424
https://bugzilla.novell.com/show_bug.cgi?id=618444
https://bugzilla.novell.com/show_bug.cgi?id=619002
https://bugzilla.novell.com/show_bug.cgi?id=619525
https://bugzilla.novell.com/show_bug.cgi?id=620372
https://bugzilla.novell.com/show_bug.cgi?id=621111
https://bugzilla.novell.com/show_bug.cgi?id=621598
https://bugzilla.novell.com/show_bug.cgi?id=621715
https://bugzilla.novell.com/show_bug.cgi?id=622635
https://bugzilla.novell.com/show_bug.cgi?id=622727
https://bugzilla.novell.com/show_bug.cgi?id=624340
https://bugzilla.novell.com/show_bug.cgi?id=624436
https://bugzilla.novell.com/show_bug.cgi?id=624587
https://bugzilla.novell.com/show_bug.cgi?id=624606
https://bugzilla.novell.com/show_bug.cgi?id=625167
https://bugzilla.novell.com/show_bug.cgi?id=625666
https://bugzilla.novell.com/show_bug.cgi?id=626321
https://bugzilla.novell.com/show_bug.cgi?id=627060
https://bugzilla.novell.com/show_bug.cgi?id=627386
https://bugzilla.novell.com/show_bug.cgi?id=627447
https://bugzilla.novell.com/show_bug.cgi?id=627518
https://bugzilla.novell.com/show_bug.cgi?id=628604
https://bugzilla.novell.com/show_bug.cgi?id=629263
https://bugzilla.novell.com/show_bug.cgi?id=629552
http://support.novell.com/security/cve/CVE-2010-2959.html
http://support.novell.com/security/cve/CVE-2010-3015.html
https://bugzilla.novell.com/show_bug.cgi?id=630068
https://bugzilla.novell.com/show_bug.cgi?id=630121
https://bugzilla.novell.com/show_bug.cgi?id=630132
https://bugzilla.novell.com/show_bug.cgi?id=631801
https://bugzilla.novell.com/show_bug.cgi?id=632309
https://bugzilla.novell.com/show_bug.cgi?id=632974
https://bugzilla.novell.com/show_bug.cgi?id=632975
https://bugzilla.novell.com/show_bug.cgi?id=633581
https://bugzilla.novell.com/show_bug.cgi?id=633585
http://support.novell.com/security/cve/CVE-2010-2478.html
http://support.novell.com/security/cve/CVE-2010-2521.html
http://support.novell.com/security/cve/CVE-2010-2524.html
http://support.novell.com/security/cve/CVE-2010-2537.html
Severity: Critical
ID: 51610
File Name: suse_11_kernel-100903.nasl
Version: 1.8
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 1/21/2011
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: Critical
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/3/2010
CVE: CVE-2010-2478, CVE-2010-2521, CVE-2010-2524, CVE-2010-2537, CVE-2010-2538, CVE-2010-2798, CVE-2010-2803, CVE-2010-2942, CVE-2010-2946, CVE-2010-2959, CVE-2010-3015