Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.850587
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for kernel (openSUSE-SU-2014:0678-1)
Zusammenfassung:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
This Linux kernel security update fixes various security issues and bugs.

The Linux Kernel was updated to fix various security issues and bugs.

Main security issues fixed:

A security issue in the tty layer that was fixed that could be used by
local attackers for code execution (CVE-2014-0196).

Two security issues in the floppy driver were fixed that could be used by
local attackers on machines with the floppy to crash the kernel or
potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).

Other security issues and bugfixes:

- netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
(bnc#860835 CVE-2014-1690).

- net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
(bnc#866102, CVE-2014-0101).

- [media] ivtv: Fix Oops when no firmware is loaded (bnc#875440).

- ALSA: hda - Add dock pin setups for Thinkpad T440 (bnc#876699).

- ip6tnl: fix double free of fb_tnl_dev on exit (bnc#876531).

- Update arm config files: Enable all USB-to-serial drivers Specifically,
enable USB_SERIAL_WISHBONE and USB_SERIAL_QT2 on all arm flavors.

- mei: limit the number of consecutive resets (bnc#821619, bnc#852656).

- mei: revamp mei reset state machine (bnc#821619, bnc#852656).

- mei: use hbm idle state to prevent spurious resets (bnc#821619).

- mei: do not run reset flow from the interrupt thread
(bnc#821619, bnc#852656).

- mei: don't get stuck in select during reset (bnc#821619).

- mei: wake also writers on reset (bnc#821619).

- mei: remove flash_work_queue (bnc#821619, bnc#852656).

- mei: me: do not load the driver if the FW doesn't support MEI interface
(bnc#821619).

- Update ec2 config files: Disable CONFIG_CAN CAN support is disabled
everywhere else, so disable it in ec2 too.

- Refresh Xen patches (bnc#851244).

- Update arm/exynos config file: disable AHCI_IMX This driver is only used
on Freescale i.MX systems so it isn't needed on Exynos.

- drm: Prefer noninterlace cmdline mode unless explicitly specified
(bnc#853350).

- kabi/severities: add exception for irda. The changes resulted in a 4x
performance increase. Any external users of this API will also want to
rebuild their modules.

- i7core_edac: Fix PCI device reference count.

- KABI: revert tcp: TSO packets automatic sizing.

- KABI: revert tcp: TSQ can use a dynamic limit.

- kabi: add exceptions for kvm and l2tp

- patches.fixes/sunrpc-add-an-info-file-for-the-dummy-gssd-pipe.patch:
Move include of utsname.h to where it's needed to avoid kABI breakage
due to utsname becoming defined.

- Update kabi files. The kABI r ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
kernel on openSUSE 13.1

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-4579
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729573
http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html
https://lists.ath9k.org/pipermail/ath9k-devel/2013-November/012215.html
http://www.openwall.com/lists/oss-security/2013/11/15/3
http://www.ubuntu.com/usn/USN-2113-1
http://www.ubuntu.com/usn/USN-2117-1
http://www.ubuntu.com/usn/USN-2133-1
http://www.ubuntu.com/usn/USN-2134-1
http://www.ubuntu.com/usn/USN-2135-1
http://www.ubuntu.com/usn/USN-2136-1
http://www.ubuntu.com/usn/USN-2138-1
http://www.ubuntu.com/usn/USN-2139-1
http://www.ubuntu.com/usn/USN-2141-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-6885
BugTraq ID: 63983
http://www.securityfocus.com/bid/63983
Debian Security Information: DSA-3128 (Google Search)
http://www.debian.org/security/2015/dsa-3128
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html
http://security.gentoo.org/glsa/glsa-201407-03.xml
http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924
http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html
http://openwall.com/lists/oss-security/2013/11/28/1
http://www.openwall.com/lists/oss-security/2013/12/02/1
RedHat Security Advisories: RHSA-2014:0285
http://rhn.redhat.com/errata/RHSA-2014-0285.html
http://www.securitytracker.com/id/1029415
http://secunia.com/advisories/55840
SuSE Security Announcement: SUSE-SU-2014:0372 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html
SuSE Security Announcement: SUSE-SU-2014:0373 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html
SuSE Security Announcement: SUSE-SU-2014:0411 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
SuSE Security Announcement: SUSE-SU-2014:0446 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
SuSE Security Announcement: SUSE-SU-2014:0459 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
SuSE Security Announcement: SUSE-SU-2014:0470 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
XForce ISS Database: xen-cve20136885-dos(89335)
https://exchange.xforce.ibmcloud.com/vulnerabilities/89335
Common Vulnerability Exposure (CVE) ID: CVE-2013-7263
http://www.openwall.com/lists/oss-security/2013/11/28/13
http://seclists.org/oss-sec/2014/q1/29
RedHat Security Advisories: RHSA-2014:0159
http://rhn.redhat.com/errata/RHSA-2014-0159.html
http://secunia.com/advisories/55882
http://secunia.com/advisories/56036
SuSE Security Announcement: SUSE-SU-2015:0481 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
SuSE Security Announcement: SUSE-SU-2015:0652 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
SuSE Security Announcement: SUSE-SU-2015:0736 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
SuSE Security Announcement: openSUSE-SU-2015:0566 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
http://www.ubuntu.com/usn/USN-2107-1
http://www.ubuntu.com/usn/USN-2108-1
http://www.ubuntu.com/usn/USN-2109-1
http://www.ubuntu.com/usn/USN-2110-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-7264
Common Vulnerability Exposure (CVE) ID: CVE-2013-7265
Common Vulnerability Exposure (CVE) ID: CVE-2013-7281
BugTraq ID: 64747
http://www.securityfocus.com/bid/64747
http://www.securitytracker.com/id/1029566
XForce ISS Database: linux-kernel-cve20137281-info-disc(90222)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90222
Common Vulnerability Exposure (CVE) ID: CVE-2014-0069
BugTraq ID: 65588
http://www.securityfocus.com/bid/65588
http://article.gmane.org/gmane.linux.kernel.cifs/9401
http://www.openwall.com/lists/oss-security/2014/02/17/4
RedHat Security Advisories: RHSA-2014:0328
http://rhn.redhat.com/errata/RHSA-2014-0328.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-0101
BugTraq ID: 65943
http://www.securityfocus.com/bid/65943
http://www.openwall.com/lists/oss-security/2014/03/04/6
RedHat Security Advisories: RHSA-2014:0419
http://rhn.redhat.com/errata/RHSA-2014-0419.html
RedHat Security Advisories: RHSA-2014:0432
http://rhn.redhat.com/errata/RHSA-2014-0432.html
http://secunia.com/advisories/59216
http://www.ubuntu.com/usn/USN-2173-1
http://www.ubuntu.com/usn/USN-2174-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-0196
Debian Security Information: DSA-2926 (Google Search)
http://www.debian.org/security/2014/dsa-2926
Debian Security Information: DSA-2928 (Google Search)
http://www.debian.org/security/2014/dsa-2928
http://www.exploit-db.com/exploits/33516
http://pastebin.com/raw.php?i=yTSFUBgZ
http://www.openwall.com/lists/oss-security/2014/05/05/6
http://www.osvdb.org/106646
RedHat Security Advisories: RHSA-2014:0512
http://rhn.redhat.com/errata/RHSA-2014-0512.html
http://secunia.com/advisories/59218
http://secunia.com/advisories/59262
http://secunia.com/advisories/59599
SuSE Security Announcement: SUSE-SU-2014:0667 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
SuSE Security Announcement: SUSE-SU-2014:0683 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
http://www.ubuntu.com/usn/USN-2196-1
http://www.ubuntu.com/usn/USN-2197-1
http://www.ubuntu.com/usn/USN-2198-1
http://www.ubuntu.com/usn/USN-2199-1
http://www.ubuntu.com/usn/USN-2200-1
http://www.ubuntu.com/usn/USN-2201-1
http://www.ubuntu.com/usn/USN-2202-1
http://www.ubuntu.com/usn/USN-2203-1
http://www.ubuntu.com/usn/USN-2204-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-1438
BugTraq ID: 64781
http://www.securityfocus.com/bid/64781
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126874.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126858.html
http://www.mandriva.com/security/advisories?name=MDVSA-2014:038
http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/
https://lkml.org/lkml/2014/1/9/637
http://www.openwall.com/lists/oss-security/2014/01/14/1
http://www.securitytracker.com/id/1029592
Common Vulnerability Exposure (CVE) ID: CVE-2014-1446
BugTraq ID: 64954
http://www.securityfocus.com/bid/64954
http://www.openwall.com/lists/oss-security/2014/01/15/3
http://www.ubuntu.com/usn/USN-2128-1
http://www.ubuntu.com/usn/USN-2129-1
XForce ISS Database: linux-kernel-cve20141446-info-disc(90445)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90445
Common Vulnerability Exposure (CVE) ID: CVE-2014-1690
http://www.openwall.com/lists/oss-security/2014/01/28/3
http://www.ubuntu.com/usn/USN-2137-1
http://www.ubuntu.com/usn/USN-2140-1
http://www.ubuntu.com/usn/USN-2158-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-1737
BugTraq ID: 67300
http://www.securityfocus.com/bid/67300
http://www.openwall.com/lists/oss-security/2014/05/09/2
RedHat Security Advisories: RHSA-2014:0800
http://rhn.redhat.com/errata/RHSA-2014-0800.html
RedHat Security Advisories: RHSA-2014:0801
http://rhn.redhat.com/errata/RHSA-2014-0801.html
http://www.securitytracker.com/id/1030474
http://secunia.com/advisories/59309
http://secunia.com/advisories/59406
Common Vulnerability Exposure (CVE) ID: CVE-2014-1738
BugTraq ID: 67302
http://www.securityfocus.com/bid/67302
Common Vulnerability Exposure (CVE) ID: CVE-2014-1874
BugTraq ID: 65459
http://www.securityfocus.com/bid/65459
http://www.openwall.com/lists/oss-security/2014/02/07/2
SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-2523
BugTraq ID: 66279
http://www.securityfocus.com/bid/66279
http://twitter.com/grsecurity/statuses/445496197399461888
http://www.openwall.com/lists/oss-security/2014/03/17/7
http://www.securitytracker.com/id/1029945
http://secunia.com/advisories/57446
XForce ISS Database: linux-kernel-cve20142523-code-exec(91910)
https://exchange.xforce.ibmcloud.com/vulnerabilities/91910
Common Vulnerability Exposure (CVE) ID: CVE-2014-2672
BugTraq ID: 66492
http://www.securityfocus.com/bid/66492
http://www.openwall.com/lists/oss-security/2014/03/30/5
http://secunia.com/advisories/57468
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.