openSUSE 10 Security Update : kernel (kernel-3760)

This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This kernel update fixes the following security problems :

- CVE-2007-1861: The nl_fib_lookup function in
net/ipv4/fib_frontend.c allows attackers to cause a
denial of service (kernel panic) via NETLINK_FIB_LOOKUP
replies, which trigger infinite recursion and a stack

- CVE-2007-1496: nfnetlink_log in netfilter allows
attackers to cause a denial of service (crash) via
unspecified vectors involving the (1) nfulnl_recv_config
function, (2) using 'multiple packets per netlink
message', and (3) bridged packets, which trigger a NULL
pointer dereference.

- CVE-2007-1497: nf_conntrack in netfilter does not set
nfctinfo during reassembly of fragmented packets, which
leaves the default value as IP_CT_ESTABLISHED and might
allow remote attackers to bypass certain rulesets using
IPv6 fragments.

Please note that the connection tracking option for IPv6
is not enabled in any currently shipping SUSE Linux
kernel, so it does not affect SUSE Linux default

- CVE-2007-2242: The IPv6 protocol allows remote attackers
to cause a denial of service via crafted IPv6 type 0
route headers (IPV6_RTHDR_TYPE_0) that create network
amplification between two routers.

The behaviour has been disabled by default, and the
patch introduces a new sysctl with which the
administrator can reenable it again.

- CVE-2006-7203: The compat_sys_mount function in
fs/compat.c allows local users to cause a denial of
service (NULL pointer dereference and oops) by mounting
a smbfs file system in compatibility mode ('mount -t

- CVE-2007-2453: Seeding of the kernel random generator on
boot did not work correctly due to a programming mistake
and so the kernel might have more predictable random
numbers than assured.

- CVE-2007-2876: A NULL pointer dereference in SCTP
connection tracking could be caused by a remote attacker
by sending specially crafted packets. Note that this
requires SCTP set-up and active to be exploitable.

and the following non security bugs :

- patches.fixes/cpufreq_fix_limited_on_battery.patch:
Fix limited freq when booted on battery. [#231107]

- patches.fixes/usb-keyspan-regression-fix.patch: USB:
keyspan regression fix [#240919]

- -
tch: hpt366: don't check enablebits for HPT36x [#278696]

Solution :

Update the affected kernel packages.

Risk factor :

High / CVSS Base Score : 7.8

Family: SuSE Local Security Checks

Nessus Plugin ID: 27295 ()

Bugtraq ID:

CVE ID: CVE-2006-7203

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now