Impact
local privilege escalation
Solution
Please Install the Updated Packages.
Insight
The SUSE Linux Enterprise 11 GA and openSUSE 11.1 kernels were updated to fix 3 critical security issues.
Following security bugs were fixed:
CVE-2010-3301: Mismatch between 32bit and 64bit register usage in the system call entry paths could be used by local attackers to gain root privileges. This problem only affects x86_64 kernels.
CVE-2010-3081: Incorrect buffer handling in the biarch-compat buffer handling could be used by local attackers to gain root privileges. This problem affects foremost x86_64 where a exploit exists, and potentially other biarch platforms, like PowerPC and S/390.
CVE-2010-2959: Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel allowed attackers to execute arbitrary code or cause a denial of service (system crash) via crafted CAN traffic.
No other bugs were fixed in this update.
Affected
kernel on openSUSE 11.1
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2010-2959, CVE-2010-3081, CVE-2010-3301 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities