Description: | Summary: The remote host is missing an update for the '-bit' package(s) announced via the SSA:2010-265-01 advisory.
Vulnerability Insight: New kernel packages are available for Slackware x86_64 13.1, and -current to fix security issues.
Here are the details from the Slackware64 13.1 ChangeLog: +--------------------------+ patches/packages/linux-2.6.33.4-2/kernel-firmware-2.6.33.4-noarch-2.txz: Rebuilt. patches/packages/linux-2.6.33.4-2/kernel-generic-2.6.33.4-x86_64-2.txz: Rebuilt. This kernel has been patched to fix security problems on x86_64: 64-bit Compatibility Mode Stack Pointer Underflow (CVE-2010-3081). IA32 System Call Entry Point Vulnerability (CVE-2010-3301). These vulnerabilities allow local users to gain root privileges. For more information, see: [links moved to references] (* Security fix *) patches/packages/linux-2.6.33.4-2/kernel-headers-2.6.33.4-x86-2.txz: Rebuilt. patches/packages/linux-2.6.33.4-2/kernel-huge-2.6.33.4-x86_64-2.txz: Rebuilt. Patched for CVE-2010-3081 and CVE-2010-3301. (* Security fix *) patches/packages/linux-2.6.33.4-2/kernel-modules-2.6.33.4-x86_64-2.txz: Rebuilt. patches/packages/linux-2.6.33.4-2/kernel-source-2.6.33.4-noarch-2.txz: Rebuilt. Patched for CVE-2010-3081 and CVE-2010-3301. (* Security fix *) patches/packages/linux-2.6.33.4-2/kernels/*: Rebuilt. Patched for CVE-2010-3081 and CVE-2010-3301. (* Security fix *) +--------------------------+
Affected Software/OS: '-bit' package(s) on Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|