Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.851629
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for kernel (openSUSE-SU-2017:2741-1)
Zusammenfassung:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The openSUSE Leap 42.3 kernel was updated to 4.4.90 to receive various
security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).

- CVE-2017-14489: The iscsi_if_rx function in
drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local
users to cause a denial of service (panic) by leveraging incorrect
length validation (bnc#1059051).

- CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).

- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the 'CR8-load exiting' and 'CR8-store
exiting' L0 vmcs02 controls exist in cases where L1 omits the 'use TPR
shadow' vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).

The following non-security bugs were fixed:

- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).

- arm64: fault: Route pte translation faults via do_translation_fault
(bnc#1012382).

- arm64: Make sure SPsel is always set (bnc#1012382).

- arm: pxa: add the number of DMA requestor lines (bnc#1012382).

- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).

- bcache: correct cache_dirty_target in __update_writeback_rate()
(bnc#1012382).

- bcache: Correct return value for sysfs attach errors (bnc#1012382).

- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).

- bcache: fix bch_hprint crash and improve output (bnc#1012382).

- bcache: fix for gc and write-back race (bnc#1012382).

- bcache: Fix leak of bdev reference (bnc#1012382).

- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).

- block: Relax a check in blk_start_queue() (bnc#1012382).

- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).

- btrfs: change how we decide to commit transactions during flushing
(bsc#1060197).

- btrfs: fix NULL pointer dereference from free_reloc_roots()
(bnc#1012382).

- btrfs: prevent to set invalid default subvolid (bnc#1012382).

- btrfs ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
Linux Kernel on openSUSE Leap 42.3

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000252
Common Vulnerability Exposure (CVE) ID: CVE-2017-12153
Common Vulnerability Exposure (CVE) ID: CVE-2017-12154
Common Vulnerability Exposure (CVE) ID: CVE-2017-14489
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.