This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
This update fixes the following issues for Hyper-V: The source code
without this patch caused hv_kvp_daemon to exit when it processed a
spoofed Netlink packet which has been sent from an untrusted local
user. Now Netlink messages with a non-zero nl_pid source address are
ignored and a warning is printed into the syslog.
This fixes the previous change from CVE-2012-2669.
See also :
Update the affected Hyper-V packages.
Risk factor :
Low / CVSS Base Score : 2.1