Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.851593
Categoría:SuSE Local Security Checks
Título:openSUSE: Security Advisory for kernel (openSUSE-SU-2017:2171-1)
Resumen:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The openSUSE Leap 42.3 kernel was updated to receive various security and
bugfixes.

The following security bugs were fixed:

- CVE-2017-1000111: Fixed a race condition in net-packet code that could
be exploited to cause out-of-bounds memory access (bsc#1052365).

- CVE-2017-1000112: Fixed a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access.
(bsc#1052311).

- CVE-2017-8831: The saa7164_bus_get function in
drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed
local users to cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact by changing a certain
sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).

The following non-security bugs were fixed:

- acpi/nfit: Add support of NVDIMM memory error notification in ACPI 6.2
(bsc#1052325).

- acpi/nfit: Issue Start ARS to retrieve existing records (bsc#1052325).

- bcache: force trigger gc (bsc#1038078).

- bcache: only recovery I/O error for writethrough mode (bsc#1043652).

- block: do not allow updates through sysfs until registration completes
(bsc#1047027).

- config: disable CONFIG_RT_GROUP_SCHED (bsc#1052204).

- drivers: hv: : As a bandaid, increase HV_UTIL_TIMEOUT from 30 to 60
seconds (bnc#1039153)

- drivers: hv: Fix a typo (fate#320485).

- drivers: hv: util: Make hv_poll_channel() a little more efficient
(fate#320485).

- drivers: hv: vmbus: Close timing hole that can corrupt per-cpu page
(fate#320485).

- drivers: hv: vmbus: Fix error code returned by vmbus_post_msg()
(fate#320485).

- Fix kABI breakage with CONFIG_RT_GROUP_SCHED=n (bsc#1052204).

- hv_netvsc: change netvsc device default duplex to FULL (fate#320485).

- hv_netvsc: Fix the carrier state error when data path is off
(fate#320485).

- hv_netvsc: Remove unnecessary var link_state from struct
netvsc_device_info (fate#320485).

- hyperv: fix warning about missing prototype (fate#320485).

- hyperv: netvsc: Neaten netvsc_send_pkt by using a temporary
(fate#320485).

- hyperv: remove unnecessary return variable (fate#320485).

- i40e/i40evf: Fix use after free in Rx cleanup path (bsc#1051689).

- IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151).

- ibmvnic: Check for transport event on driver resume (bsc#1051556,
bsc#1052709).

- ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).

- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).

- iommu/amd: Enable ga_log_intr when enabling guest_mode (bsc1052533).

- iommu/amd: Fix schedule ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
Linux Kernel on openSUSE Leap 42.3

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-8831
BugTraq ID: 99619
http://www.securityfocus.com/bid/99619
http://www.securityfocus.com/archive/1/540770/30/0/threaded
https://bugzilla.kernel.org/show_bug.cgi?id=195559
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://usn.ubuntu.com/3754-1/
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.