Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.851632
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for kernel (openSUSE-SU-2017:2846-1)
Summary:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The openSUSE Leap 42.3 kernel was updated
to 4.4.92 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bnc#1063667).

- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel
allowed local users to cause a denial of service (use-after-free) or
possibly have unspecified other impact via crafted /dev/snd/seq ioctl
calls, related to sound/core/seq/seq_clientmgr.c and
sound/core/seq/seq_ports.c (bnc#1062520).

- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bnc#1064388).

The following non-security bugs were fixed:

- acpi/processor: Check for duplicate processor ids at hotplug time
(bnc#1056230).

- acpi/processor: Implement DEVICE operator for processor enumeration
(bnc#1056230).

- add mainline tags to hyperv patches

- alsa: au88x0: avoid theoretical uninitialized access (bnc#1012382).

- alsa: compress: Remove unused variable (bnc#1012382).

- alsa: usb-audio: Check out-of-bounds access by corrupted buffer
descriptor (bnc#1012382).

- alsa: usx2y: Suppress kernel warning at page allocation failures
(bnc#1012382).

- arm64: add function to get a cpu's MADT GICC table (bsc#1062279).

- arm64: dts: Add Broadcom Vulcan PMU in dts (fate#319481).

- arm64/perf: Access pmu register using read/write gt _sys_reg
(bsc#1062279).

- arm64/perf: Add Broadcom Vulcan PMU support (fate#319481).

- arm64/perf: Changed events naming as per the ARM ARM (fate#319481).

- arm64/perf: Define complete ARMv8 recommended implementation defined
events (fate#319481).

- arm64: perf: do not expose CHAIN event in sysfs (bsc#1062279).

- arm64: perf: Extend event config for ARMv8.1 (bsc#1062279).

- arm64/perf: Filter common events based on PMCEIDn_EL0 (fate#319481).

- arm64: perf: Ignore exclude_hv when kernel is running in HYP
(bsc#1062279).

- arm64: perf: move to common attr_group fields (bsc#1062279).

- arm64: perf: Use the builtin_platform_driver (bsc#1062279).

- arm64: pmu: add fallback probe table (bsc#1062279).

- arm64: pmu: Hoist pmu platform device name (bsc#1062279).

- a ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
Linux Kernel on openSUSE Leap 42.3

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-13080
BugTraq ID: 101274
http://www.securityfocus.com/bid/101274
CERT/CC vulnerability note: VU#228519
http://www.kb.cert.org/vuls/id/228519
Cisco Security Advisory: 20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
Debian Security Information: DSA-3999 (Google Search)
http://www.debian.org/security/2017/dsa-3999
FreeBSD Security Advisory: FreeBSD-SA-17:07
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
https://security.gentoo.org/glsa/201711-03
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
https://www.krackattacks.com/
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
RedHat Security Advisories: RHSA-2017:2907
https://access.redhat.com/errata/RHSA-2017:2907
RedHat Security Advisories: RHSA-2017:2911
https://access.redhat.com/errata/RHSA-2017:2911
http://www.securitytracker.com/id/1039572
http://www.securitytracker.com/id/1039573
http://www.securitytracker.com/id/1039576
http://www.securitytracker.com/id/1039577
http://www.securitytracker.com/id/1039578
http://www.securitytracker.com/id/1039581
http://www.securitytracker.com/id/1039585
http://www.securitytracker.com/id/1039703
SuSE Security Announcement: SUSE-SU-2017:2745 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
SuSE Security Announcement: SUSE-SU-2017:2752 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
SuSE Security Announcement: openSUSE-SU-2017:2755 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
http://www.ubuntu.com/usn/USN-3455-1
Common Vulnerability Exposure (CVE) ID: CVE-2017-15265
BugTraq ID: 101288
http://www.securityfocus.com/bid/101288
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
https://bugzilla.suse.com/show_bug.cgi?id=1062520
https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://source.android.com/security/bulletin/2018-02-01
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
http://www.openwall.com/lists/oss-security/2017/10/11/3
RedHat Security Advisories: RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:0676
RedHat Security Advisories: RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1062
RedHat Security Advisories: RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1130
RedHat Security Advisories: RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:1170
RedHat Security Advisories: RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2390
RedHat Security Advisories: RHSA-2018:3822
https://access.redhat.com/errata/RHSA-2018:3822
RedHat Security Advisories: RHSA-2018:3823
https://access.redhat.com/errata/RHSA-2018:3823
http://www.securitytracker.com/id/1039561
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-15649
BugTraq ID: 101573
http://www.securityfocus.com/bid/101573
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e
http://patchwork.ozlabs.org/patch/813945/
http://patchwork.ozlabs.org/patch/818726/
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
https://blogs.securiteam.com/index.php/archives/3484
https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e
RedHat Security Advisories: RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0151
RedHat Security Advisories: RHSA-2018:0152
https://access.redhat.com/errata/RHSA-2018:0152
RedHat Security Advisories: RHSA-2018:0181
https://access.redhat.com/errata/RHSA-2018:0181
https://usn.ubuntu.com/3754-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-6346
BugTraq ID: 96508
http://www.securityfocus.com/bid/96508
Debian Security Information: DSA-3804 (Google Search)
http://www.debian.org/security/2017/dsa-3804
http://www.openwall.com/lists/oss-security/2017/02/28/6
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.