SuSE Update for kernel SUSE-SA:2007:035

Impact
remote denial of service
Solution
Please Install the Updated Packages.
Insight
This kernel update fixes the following security problems in our SUSE Linux Enterprise Server 9, Novell Linux Desktop 9 and Open Enterprise Server kernels. - CVE-2006-2936: The ftdi_sio driver allowed local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued. This requires this driver to be loaded, which only happens if such a device is plugged in. - CVE-2006-5871: smbfs when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified UID, GID and MODE settings. - CVE-2006-6106: Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel allowed remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field. - CVE-2006-6535: The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead to data corruption and &quot node lockups&quot . This issue might not be exploitable at all for an attacker. - CVE-2006-5749: The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux kernel does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash. - CVE-2006-5753: Unspecified vulnerability in the listxattr system call in Linux kernel, when a &quot bad inode&quot is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges. - CVE-2006-5754: The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash). - CVE-2007-1357: A denial of service problem against the AppleTalk protocol was fixed. A remote attacker in the same AppleTalk network segment could cause the machine to crash if it has AppleTalk protocol loaded. Please note that we do not load the AppleTalk protocol by default and such an attack would only be working within a AppleT ... Description truncated, for more information please check the Reference URL
Affected
kernel on SUSE SLES 9, Novell Linux Desktop 9, Open Enterprise Server, Novell Linux POS 9
References