This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote SuSE 10 host is missing a security-related patch.
This kernel update fixes quite a number of security problems :
- A remote attacker could crash the IPSec/IPv6 stack by
sending a bad ESP packet. This requires the host to be
able to receive such packets (default filtered by the
- A problem in SIT IPv6 tunnel handling could be used by
remote attackers to immediately crash the machine.
- On x86_64 a denial of service attack could be used by
local attackers to immediately panic / crash the
- An information leakage during coredumping of root
processes was fixed. (CVE-2007-6206)
- Fixed a SMP ordering problem in fcntl_setlk could
potentially allow local attackers to execute code by
timing file locking. (CVE-2008-1669)
- Fixed a dnotify race condition, which could be used by
local attackers to potentially execute code.
- A ptrace bug could be used by local attackers to hang
their own processes indefinitely. (CVE-2007-5500)
- Clear the 'direction' flag before calling signal
handlers. For specific not yet identified programs under
specific timing conditions this could potentially have
caused memory corruption or code execution.
- The isdn_ioctl function in isdn_common.c allowed local
users to cause a denial of service via a crafted ioctl
struct in which ioctls is not null terminated, which
triggers a buffer overflow. (CVE-2007-6151)
Non security related changes :
OCFS2 was updated to version v1.2.9-1-r3100.
Also a huge number of bugs were fixed. Please refer to the
RPM changelog for a detailed list.
See also :
Apply ZYPP patch number 5370.
Risk factor :
High / CVSS Base Score : 7.8
Family: SuSE Local Security Checks
Nessus Plugin ID: 59128 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now