[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2010:039 -- SUSE kernel local privilege escalation

ID: oval:org.secpod.oval:def:400037Date: (C)2012-01-31   (M)2024-01-02
Class: PATCHFamily: unix




This update of the openSUSE 11.3 kernel brings the kernel to version 2.6.34.4 and contains a lot of bug and security fixes CVE-2010-3110: Missing bounds checks in several ioctls of the Novell Client novfs /proc interface allowed unprivileged local users to crash the kernel or even execute code in kernel context. The affected module is only loaded when the Novell Client stack is configured. CVE-2010-2524: A malicious local user could fill the cache used by CIFS do perform dns lookups with chosen data, therefore tricking the kernel into mounting a wrong CIFS server. CVE-2010-2798: A local user could trigger a NULL dereference on a gfs2 file system. CVE-2010-2537: A local user could overwrite append-only files on a btrfs file system. CVE-2010-2538: A local user could read kernel memory of a btrfs file system.

Platform:
openSUSE 11.3
Product:
kernel
Reference:
SUSE-SA:2010:039
CVE-2010-2524
CVE-2010-2537
CVE-2010-2538
CVE-2010-2798
CVE-2010-3110
CVE    5
CVE-2010-3110
CVE-2010-2538
CVE-2010-2537
CVE-2010-2524
...
CPE    1
cpe:/o:opensuse:opensuse:11.3

© SecPod Technologies