SuSE 10 Security Update : the Linux kernel (ZYPP Patch Number 7164)

high Nessus Plugin ID 59152

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

This kernel update for the SUSE Linux Enterprise 10 SP3 kernel fixes several critical security issues.

The following security issues were fixed :

- Incorrect buffer handling in the biarch-compat buffer handling could be used by local attackers to gain root privileges. This problem affects foremost x86_64, or potentially other biarch platforms, like PowerPC and S390x. (CVE-2010-3081)

- A kernel information leak via the WEXT ioctl was fixed.
(CVE-2010-2955)

- A kernel information leak via the XFS filesystem was fixed. (CVE-2010-3078)

- A kernel information leak in the net eql code was fixed.
(CVE-2010-3297)

Additionally a data corruption bug in s390 was fixed :

- A race between /proc/pid/stat and fork in the S390 kernel could lead to data corruption.

Solution

Apply ZYPP patch number 7164.

See Also

http://support.novell.com/security/cve/CVE-2010-2955.html

http://support.novell.com/security/cve/CVE-2010-3078.html

http://support.novell.com/security/cve/CVE-2010-3081.html

http://support.novell.com/security/cve/CVE-2010-3297.html

Plugin Details

Severity: High

ID: 59152

File Name: suse_kernel-7164.nasl

Version: 1.11

Type: local

Agent: unix

Published: 5/17/2012

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/20/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-2955, CVE-2010-3078, CVE-2010-3081, CVE-2010-3297