Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.850675
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for kernel (openSUSE-SU-2015:1382-1)
Summary:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The openSUSE 13.2 kernel was updated to receive various security and
bugfixes.

The following security bugs were fixed:

- CVE-2015-3290: A flaw was found in the way the Linux kernels nested NMI
handler and espfix64 functionalities interacted during NMI processing. A
local, unprivileged user could use this flaw to crash the system or,
potentially, escalate their privileges on the system.

- CVE-2015-3212: A race condition flaw was found in the way the Linux
kernels SCTP implementation handled Address Configuration lists when
performing Address Configuration Change (ASCONF). A local attacker could
use this flaw to crash the system via a race condition triggered by
setting certain ASCONF options on a socket.

- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
incorrect package checksums was fixed. (bsc#936831).

- CVE-2015-5366: A remote denial of service (unexpected error returns) via
UDP flood with incorrect package checksums was fixed. (bsc#936831).

- CVE-2015-4700: A local user could have created a bad instruction in the
JIT processed BPF code, leading to a kernel crash (bnc#935705).

- CVE-2015-1420: Race condition in the handle_to_path function in
fs/fhandle.c in the Linux kernel allowed local users to bypass intended
size restrictions and trigger read operations on additional memory
locations by changing the handle_bytes value of a file handle during the
execution of this function (bnc#915517).

- CVE-2015-4692: The kvm_apic_has_events function in arch/x86/kvm/lapic.h
in the Linux kernel allowed local users to cause a denial of service
(NULL pointer dereference and system crash) or possibly have unspecified
other impact by leveraging /dev/kvm access for an ioctl call
(bnc#935542).

- CVE-2015-4167 CVE-2014-9728 CVE-2014-9730 CVE-2014-9729 CVE-2014-9731:
Various problems in the UDF filesystem were fixed that could lead to
crashes when mounting prepared udf filesystems.

- CVE-2015-4002: drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver
in the Linux kernel did not ensure that certain length values are
sufficiently large, which allowed remote attackers to cause a denial of
service (system crash or large loop) or possibly execute arbitrary code
via a crafted packet, related to the (1) oz_usb_rx and (2)
oz_usb_handle_ep_data functions (bnc#933934).

- CVE-2015-4003: The oz_usb_handle_ep_data function in
drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux
kernel allowed remote attackers to cause a denial of service
(divide-by-zero error and system crash) via a crafted packet
(bnc#9339 ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
kernel on openSUSE 13.2

Solution:
Please install the updated package(s).

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9728
74964
http://www.securityfocus.com/bid/74964
SUSE-SU-2015:1224
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
SUSE-SU-2015:1324
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
SUSE-SU-2015:1592
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
SUSE-SU-2015:1611
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c
https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
openSUSE-SU-2015:1382
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-9729
Common Vulnerability Exposure (CVE) ID: CVE-2014-9730
Common Vulnerability Exposure (CVE) ID: CVE-2014-9731
75001
http://www.securityfocus.com/bid/75001
[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
http://www.openwall.com/lists/oss-security/2015/06/03/4
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
https://bugzilla.redhat.com/show_bug.cgi?id=1228220
https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
https://source.android.com/security/bulletin/2017-07-01
Common Vulnerability Exposure (CVE) ID: CVE-2015-1420
BugTraq ID: 72357
http://www.securityfocus.com/bid/72357
Debian Security Information: DSA-3170 (Google Search)
http://www.debian.org/security/2015/dsa-3170
http://marc.info/?l=linux-kernel&m=142247707318982&w=2
http://www.openwall.com/lists/oss-security/2015/01/29/12
SuSE Security Announcement: SUSE-SU-2015:1224 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:1478 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
SuSE Security Announcement: SUSE-SU-2015:1592 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:1611 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:1382 (Google Search)
http://www.ubuntu.com/usn/USN-2660-1
http://www.ubuntu.com/usn/USN-2661-1
http://www.ubuntu.com/usn/USN-2665-1
http://www.ubuntu.com/usn/USN-2667-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-1465
BugTraq ID: 72435
http://www.securityfocus.com/bid/72435
http://www.openwall.com/lists/oss-security/2015/02/03/13
http://www.securitytracker.com/id/1036763
SuSE Security Announcement: SUSE-SU-2015:1488 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
SuSE Security Announcement: SUSE-SU-2015:1489 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
http://www.ubuntu.com/usn/USN-2545-1
http://www.ubuntu.com/usn/USN-2546-1
http://www.ubuntu.com/usn/USN-2562-1
http://www.ubuntu.com/usn/USN-2563-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-2041
BugTraq ID: 72729
http://www.securityfocus.com/bid/72729
Debian Security Information: DSA-3237 (Google Search)
http://www.debian.org/security/2015/dsa-3237
http://www.openwall.com/lists/oss-security/2015/02/20/19
SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
http://www.ubuntu.com/usn/USN-2560-1
http://www.ubuntu.com/usn/USN-2561-1
http://www.ubuntu.com/usn/USN-2564-1
http://www.ubuntu.com/usn/USN-2565-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-2922
BugTraq ID: 74315
http://www.securityfocus.com/bid/74315
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155908.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155804.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155854.html
http://www.openwall.com/lists/oss-security/2015/04/04/2
RedHat Security Advisories: RHSA-2015:1221
http://rhn.redhat.com/errata/RHSA-2015-1221.html
RedHat Security Advisories: RHSA-2015:1534
http://rhn.redhat.com/errata/RHSA-2015-1534.html
RedHat Security Advisories: RHSA-2015:1564
http://rhn.redhat.com/errata/RHSA-2015-1564.html
http://www.securitytracker.com/id/1032417
Common Vulnerability Exposure (CVE) ID: CVE-2015-3212
1033169
http://www.securitytracker.com/id/1033169
76082
http://www.securityfocus.com/bid/76082
DSA-3329
http://www.debian.org/security/2015/dsa-3329
RHSA-2015:1778
http://rhn.redhat.com/errata/RHSA-2015-1778.html
RHSA-2015:1787
http://rhn.redhat.com/errata/RHSA-2015-1787.html
USN-2713-1
http://www.ubuntu.com/usn/USN-2713-1
USN-2714-1
http://www.ubuntu.com/usn/USN-2714-1
USN-2715-1
http://www.ubuntu.com/usn/USN-2715-1
USN-2716-1
http://www.ubuntu.com/usn/USN-2716-1
USN-2717-1
http://www.ubuntu.com/usn/USN-2717-1
USN-2718-1
http://www.ubuntu.com/usn/USN-2718-1
USN-2719-1
http://www.ubuntu.com/usn/USN-2719-1
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2d45a02d0166caf2627fe91897c6ffc3b19514c4
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.2
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://bugzilla.redhat.com/show_bug.cgi?id=1226442
https://github.com/torvalds/linux/commit/2d45a02d0166caf2627fe91897c6ffc3b19514c4
https://support.f5.com/csp/article/K05211147
Common Vulnerability Exposure (CVE) ID: CVE-2015-3290
37722
https://www.exploit-db.com/exploits/37722/
76004
http://www.securityfocus.com/bid/76004
DSA-3313
http://www.debian.org/security/2015/dsa-3313
USN-2687-1
http://www.ubuntu.com/usn/USN-2687-1
USN-2688-1
http://www.ubuntu.com/usn/USN-2688-1
USN-2689-1
http://www.ubuntu.com/usn/USN-2689-1
USN-2690-1
http://www.ubuntu.com/usn/USN-2690-1
USN-2691-1
http://www.ubuntu.com/usn/USN-2691-1
[oss-security] 20150722 Linux x86_64 NMI security issues
http://www.openwall.com/lists/oss-security/2015/07/22/7
[oss-security] 20150804 CVE-2015-3290: Linux privilege escalation due to nested NMIs interrupting espfix64
http://www.openwall.com/lists/oss-security/2015/08/04/8
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
https://bugzilla.redhat.com/show_bug.cgi?id=1243465
https://github.com/torvalds/linux/commit/9b6e6a8334d56354853f9c255d1395c2ba570e0a
Common Vulnerability Exposure (CVE) ID: CVE-2015-3339
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html
http://www.openwall.com/lists/oss-security/2015/04/20/5
RedHat Security Advisories: RHSA-2015:1272
http://rhn.redhat.com/errata/RHSA-2015-1272.html
http://www.securitytracker.com/id/1032412
SuSE Security Announcement: SUSE-SU-2015:1487 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
SuSE Security Announcement: SUSE-SU-2015:1491 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
SuSE Security Announcement: SUSE-SU-2016:2074 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3636
BugTraq ID: 74450
http://www.securityfocus.com/bid/74450
Debian Security Information: DSA-3290 (Google Search)
http://www.debian.org/security/2015/dsa-3290
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157788.html
http://www.openwall.com/lists/oss-security/2015/05/02/5
RedHat Security Advisories: RHSA-2015:1583
http://rhn.redhat.com/errata/RHSA-2015-1583.html
RedHat Security Advisories: RHSA-2015:1643
http://rhn.redhat.com/errata/RHSA-2015-1643.html
http://www.securitytracker.com/id/1033186
http://www.ubuntu.com/usn/USN-2631-1
http://www.ubuntu.com/usn/USN-2632-1
http://www.ubuntu.com/usn/USN-2633-1
http://www.ubuntu.com/usn/USN-2634-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-4001
BugTraq ID: 74672
http://www.securityfocus.com/bid/74672
http://openwall.com/lists/oss-security/2015/06/05/7
Common Vulnerability Exposure (CVE) ID: CVE-2015-4002
BugTraq ID: 74668
http://www.securityfocus.com/bid/74668
Common Vulnerability Exposure (CVE) ID: CVE-2015-4003
Common Vulnerability Exposure (CVE) ID: CVE-2015-4036
BugTraq ID: 74664
http://www.securityfocus.com/bid/74664
http://www.openwall.com/lists/oss-security/2015/05/13/4
http://www.securitytracker.com/id/1033729
SuSE Security Announcement: SUSE-SU-2015:1324 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2015-4167
1033187
http://www.securitytracker.com/id/1033187
74963
http://www.securityfocus.com/bid/74963
DSA-3290
USN-2631-1
USN-2632-1
[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops
http://www.openwall.com/lists/oss-security/2015/06/02/6
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1
https://bugzilla.redhat.com/show_bug.cgi?id=1228204
https://github.com/torvalds/linux/commit/23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
Common Vulnerability Exposure (CVE) ID: CVE-2015-4692
BugTraq ID: 75142
http://www.securityfocus.com/bid/75142
Debian Security Information: DSA-3329 (Google Search)
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160829.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161144.html
http://www.openwall.com/lists/oss-security/2015/06/21/1
http://www.securitytracker.com/id/1032798
http://www.ubuntu.com/usn/USN-2680-1
http://www.ubuntu.com/usn/USN-2681-1
http://www.ubuntu.com/usn/USN-2682-1
http://www.ubuntu.com/usn/USN-2683-1
http://www.ubuntu.com/usn/USN-2684-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-4700
BugTraq ID: 75356
http://www.securityfocus.com/bid/75356
http://www.openwall.com/lists/oss-security/2015/06/23/2
RedHat Security Advisories: RHSA-2015:1778
http://www.securitytracker.com/id/1033046
SuSE Security Announcement: SUSE-SU-2015:1490 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html
http://www.ubuntu.com/usn/USN-2679-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-5364
BugTraq ID: 75510
http://www.securityfocus.com/bid/75510
Debian Security Information: DSA-3313 (Google Search)
https://twitter.com/grsecurity/status/605854034260426753
http://www.openwall.com/lists/oss-security/2015/06/30/13
RedHat Security Advisories: RHSA-2015:1623
http://rhn.redhat.com/errata/RHSA-2015-1623.html
RedHat Security Advisories: RHSA-2015:1787
RedHat Security Advisories: RHSA-2016:0045
http://rhn.redhat.com/errata/RHSA-2016-0045.html
RedHat Security Advisories: RHSA-2016:1096
http://rhn.redhat.com/errata/RHSA-2016-1096.html
RedHat Security Advisories: RHSA-2016:1100
http://rhn.redhat.com/errata/RHSA-2016-1100.html
RedHat Security Advisories: RHSA-2016:1225
https://access.redhat.com/errata/RHSA-2016:1225
http://www.securitytracker.com/id/1032794
Common Vulnerability Exposure (CVE) ID: CVE-2015-5366
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.