Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.13.2017.258.02
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2017-258-02)
Summary:The remote host is missing an update for the 'kernel' package(s) announced via the SSA:2017-258-02 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel' package(s) announced via the SSA:2017-258-02 advisory.

Vulnerability Insight:
New kernel packages are available for Slackware 14.1, 14.2, and -current to
fix a security issue.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/linux-4.4.88/*: Upgraded.
This update fixes the security vulnerability known as 'BlueBorne'.
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at
Linux kernel version 3.3-rc1 is vulnerable to a stack overflow in
the processing of L2CAP configuration responses resulting in remote
code execution in kernel space.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'kernel' package(s) on Slackware 14.1, Slackware 14.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.7

CVSS Vector:
AV:A/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000251
BugTraq ID: 100809
http://www.securityfocus.com/bid/100809
CERT/CC vulnerability note: VU#240311
https://www.kb.cert.org/vuls/id/240311
Debian Security Information: DSA-3981 (Google Search)
http://www.debian.org/security/2017/dsa-3981
https://www.exploit-db.com/exploits/42762/
https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
https://www.armis.com/blueborne
RedHat Security Advisories: RHSA-2017:2679
https://access.redhat.com/errata/RHSA-2017:2679
RedHat Security Advisories: RHSA-2017:2680
https://access.redhat.com/errata/RHSA-2017:2680
RedHat Security Advisories: RHSA-2017:2681
https://access.redhat.com/errata/RHSA-2017:2681
RedHat Security Advisories: RHSA-2017:2682
https://access.redhat.com/errata/RHSA-2017:2682
RedHat Security Advisories: RHSA-2017:2683
https://access.redhat.com/errata/RHSA-2017:2683
RedHat Security Advisories: RHSA-2017:2704
https://access.redhat.com/errata/RHSA-2017:2704
RedHat Security Advisories: RHSA-2017:2705
https://access.redhat.com/errata/RHSA-2017:2705
RedHat Security Advisories: RHSA-2017:2706
https://access.redhat.com/errata/RHSA-2017:2706
RedHat Security Advisories: RHSA-2017:2707
https://access.redhat.com/errata/RHSA-2017:2707
RedHat Security Advisories: RHSA-2017:2731
https://access.redhat.com/errata/RHSA-2017:2731
RedHat Security Advisories: RHSA-2017:2732
https://access.redhat.com/errata/RHSA-2017:2732
http://www.securitytracker.com/id/1039373
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.