Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.851489
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for kernel (openSUSE-SU-2017:0458-1)
Summary:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The openSUSE Leap 42.1 kernel to 4.1.38 to receive various security and
bugfixes.

The following security bugs were fixed:

- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
function in net/socket.c in the Linux kernel allowed remote attackers to
execute arbitrary code via vectors involving a recvmmsg system call that
is mishandled during error processing (bnc#1003077).

- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set
setgid bits on files they don't down (bsc#1021258).

- CVE-2016-10147: crypto/mcryptd.c in the Linux kernel allowed local users
to cause a denial of service (NULL pointer dereference and system crash)
by using an AF_ALG socket with an incompatible algorithm, as
demonstrated by mcryptd(md5) (bnc#1020381).

- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations or cause a denial of service (use-after-free) by
leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2016-9576 (bnc#1017710).

- CVE-2016-7917: The nfnetlink_rcv_batch function in
net/netfilter/nfnetlink.c in the Linux kernel did not check whether a
batch message's length field is large enough, which allowed local users
to obtain sensitive information from kernel memory or cause a denial of
service (infinite loop or out-of-bounds read) by leveraging the
CAP_NET_ADMIN capability (bnc#1010444).

- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb
truncation, which allowed local users to cause a denial of service
(system crash) via a crafted application that made sendto system calls,
related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).

- CVE-2016-9806: Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel allowed local users to
cause a denial of service (double free) or possibly have unspecified
other impact via a crafted application that made sendmsg system calls,
leading to a free operation associated with a new dump that started
earlier than anticipated (bnc#1013540 1017589).

- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging th ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
Kernel on openSUSE Leap 42.1

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-10088
BugTraq ID: 95169
http://www.securityfocus.com/bid/95169
http://www.openwall.com/lists/oss-security/2016/12/30/1
RedHat Security Advisories: RHSA-2017:0817
http://rhn.redhat.com/errata/RHSA-2017-0817.html
RedHat Security Advisories: RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2077
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
http://www.securitytracker.com/id/1037538
Common Vulnerability Exposure (CVE) ID: CVE-2016-10147
95677
http://www.securityfocus.com/bid/95677
RHSA-2017:1842
RHSA-2017:2077
[linux-crypto] 20161202 Crash in crypto mcryptd
http://marc.info/?l=linux-crypto-vger&m=148063683310477&w=2
[oss-security] 20170117 CVE request -- linux kernel: crash by spawning mcrypt(alg) with incompatible algorithm
http://www.openwall.com/lists/oss-security/2017/01/17/13
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48a992727d82cb7db076fa15d372178743b1f4cd
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.15
https://bugzilla.redhat.com/show_bug.cgi?id=1404200
https://github.com/torvalds/linux/commit/48a992727d82cb7db076fa15d372178743b1f4cd
Common Vulnerability Exposure (CVE) ID: CVE-2016-7117
BugTraq ID: 93304
http://www.securityfocus.com/bid/93304
RedHat Security Advisories: RHSA-2016:2962
http://rhn.redhat.com/errata/RHSA-2016-2962.html
RedHat Security Advisories: RHSA-2017:0031
http://rhn.redhat.com/errata/RHSA-2017-0031.html
RedHat Security Advisories: RHSA-2017:0036
http://rhn.redhat.com/errata/RHSA-2017-0036.html
RedHat Security Advisories: RHSA-2017:0065
http://rhn.redhat.com/errata/RHSA-2017-0065.html
RedHat Security Advisories: RHSA-2017:0086
http://rhn.redhat.com/errata/RHSA-2017-0086.html
RedHat Security Advisories: RHSA-2017:0091
http://rhn.redhat.com/errata/RHSA-2017-0091.html
RedHat Security Advisories: RHSA-2017:0113
http://rhn.redhat.com/errata/RHSA-2017-0113.html
RedHat Security Advisories: RHSA-2017:0196
http://rhn.redhat.com/errata/RHSA-2017-0196.html
RedHat Security Advisories: RHSA-2017:0215
http://rhn.redhat.com/errata/RHSA-2017-0215.html
RedHat Security Advisories: RHSA-2017:0216
http://rhn.redhat.com/errata/RHSA-2017-0216.html
RedHat Security Advisories: RHSA-2017:0217
http://rhn.redhat.com/errata/RHSA-2017-0217.html
RedHat Security Advisories: RHSA-2017:0270
http://rhn.redhat.com/errata/RHSA-2017-0270.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-7917
BugTraq ID: 94147
http://www.securityfocus.com/bid/94147
Common Vulnerability Exposure (CVE) ID: CVE-2016-8645
1037285
http://www.securitytracker.com/id/1037285
94264
http://www.securityfocus.com/bid/94264
RHSA-2017:2669
[oss-security] 20161111 CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c
http://www.openwall.com/lists/oss-security/2016/11/11/3
[oss-security] 20161130 Re: CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c
http://www.openwall.com/lists/oss-security/2016/11/30/3
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac6e780070e30e4c35bd395acfe9191e6268bdd3
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.10
https://bugzilla.redhat.com/show_bug.cgi?id=1393904
https://github.com/torvalds/linux/commit/ac6e780070e30e4c35bd395acfe9191e6268bdd3
Common Vulnerability Exposure (CVE) ID: CVE-2016-9793
BugTraq ID: 94655
http://www.securityfocus.com/bid/94655
https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
http://www.openwall.com/lists/oss-security/2016/12/03/1
RedHat Security Advisories: RHSA-2017:0931
https://access.redhat.com/errata/RHSA-2017:0931
RedHat Security Advisories: RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0932
RedHat Security Advisories: RHSA-2017:0933
https://access.redhat.com/errata/RHSA-2017:0933
http://www.securitytracker.com/id/1037968
Common Vulnerability Exposure (CVE) ID: CVE-2016-9806
BugTraq ID: 94653
http://www.securityfocus.com/bid/94653
http://lists.openwall.net/netdev/2016/05/15/69
http://www.openwall.com/lists/oss-security/2016/12/03/4
Common Vulnerability Exposure (CVE) ID: CVE-2017-5551
BugTraq ID: 95717
http://www.securityfocus.com/bid/95717
Debian Security Information: DSA-3791 (Google Search)
http://www.debian.org/security/2017/dsa-3791
http://www.openwall.com/lists/oss-security/2017/01/21/3
http://www.securitytracker.com/id/1038053
Common Vulnerability Exposure (CVE) ID: CVE-2016-9576
94821
http://www.securityfocus.com/bid/94821
RHSA-2017:0817
SUSE-SU-2016:3146
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
SUSE-SU-2016:3188
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
SUSE-SU-2016:3203
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
SUSE-SU-2016:3217
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
SUSE-SU-2016:3248
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
SUSE-SU-2016:3252
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface
http://www.openwall.com/lists/oss-security/2016/12/08/19
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
https://bugzilla.redhat.com/show_bug.cgi?id=1403145
https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0
openSUSE-SU-2016:3085
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html
openSUSE-SU-2016:3086
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00041.html
openSUSE-SU-2016:3118
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.