openSUSE 10 Security Update : kernel (kernel-5336)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This kernel update fixes the following security problems :

CVE-2008-1615: On x86_64 a denial of service attack could be used by
local attackers to immediately panic / crash the machine.

CVE-2008-2358: A security problem in DCCP was fixed, which could be
used by remote attackers to crash the machine.

CVE-2007-6206: An information leakage during coredumping of root
processes was fixed.

CVE-2007-6712: A integer overflow in the hrtimer_forward function
(hrtimer.c) in Linux kernel, when running on 64-bit systems, allows
local users to cause a denial of service (infinite loop) via a timer
with a large expiry value, which causes the timer to always be

CVE-2008-2136: A problem in SIT IPv6 tunnel handling could be used by
remote attackers to immediately crash the machine.

CVE-2008-1669: Fixed a SMP ordering problem in fcntl_setlk could
potentially allow local attackers to execute code by timing file

CVE-2008-1367: Clear the 'direction' flag before calling signal
handlers. For specific not yet identified programs under specific
timing conditions this could potentially have caused memory corruption
or code execution.

CVE-2008-1375: Fixed a dnotify race condition, which could be used by
local attackers to potentially execute code.

CVE-2007-6282: A remote attacker could crash the IPSec/IPv6 stack by
sending a bad ESP packet. This requires the host to be able to receive
such packets (default filtered by the firewall).

CVE-2007-5500: A ptrace bug could be used by local attackers to hang
their own processes indefinitely.

CVE-2007-5904: A remote buffer overflow in CIFS was fixed which could
be used by remote attackers to crash the machine or potentially
execute code.

And the following bugs (numbers are
references) :

- patches.arch/x86-nosmp-implies-noapic.patch: When
booting with nosmp or maxcpus=0 on i386 or x86-64, we
must disable the I/O APIC, otherwise the system won't
boot in most cases (bnc#308540).

- patches.arch/i386-at-sysinfo-ehdr: i386: make
AT_SYSINFO_EHDR consistent with AT_SYSINFO (bnc#289641).

- patches.suse/bonding-workqueue: Update to fix a hang
when closing a bonding device (342994).

- patches.fixes/mptspi-dv-renegotiate-oops: mptlinux
crashes on kernel 2.6.22 (bnc#271749).

See also :

Solution :

Update the affected kernel packages.

Risk factor :

High / CVSS Base Score : 7.8

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now