|Category:||SuSE Local Security Checks|
|Title:||SuSE Update for the Linux Kernel openSUSE-SU-2018:2738-1 (kernel)|
|Summary:||The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.
The openSUSE Leap 42.3 kernel was updated to 4.4.155 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2018-13093: Prevent NULL pointer dereference and panic in
on a NULL inode- i_ops pointer when doing pathwalks on a corrupted xfs
image. This occurred because of a lack of proper validation that cached
inodes are free during allocation (bnc#1100001).
- CVE-2018-13095: Prevent denial of service (memory corruption and BUG)
that could have occurred for a corrupted xfs image upon encountering an
inode that is in extent format, but has more extents than fit in the
inode fork (bnc#1099999).
- CVE-2018-13094: Prevent OOPS that might have occurred for a corrupted xfs
image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code is
caused by the way the overrun accounting works. Depending on interval
and expiry time values, the overrun could have been larger than INT_MAX,
but the accounting is int based. This basically made the accounting
values, which are visible to user space via timer_getoverrun(2) and
siginfo::si_overrun, random. For example, a local user could have caused
a denial of service (signed integer overflow) via crafted mmap, futex,
timer_create, and timer_settime system calls (bnc#1099922).
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status
that could have been used by local attackers to read kernel memory
because a cast from unsigned long to int interferes with bounds checking
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903).
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause
a denial of service (ias_object use-after-free and system crash) or
possibly have unspecified other impact via an AF_IRDA socket
- CVE-2018-6554: Prevent memory leak in the irda_bind function that
allowed local users to cause a denial of service (memory consumption) by
repeatedly binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-1129: A flaw was found in the way signature calculation was
handled by cephx authentication protocol. An attacker having access to
ceph cluster network who is able to alter the message payload was able
to bypass signature checks done by cephx protocol (bnc#1096748).
- CVE-2018-1128: It was found that cephx authentication protocol did not
verify ceph clien ...
Description truncated, please see the referenced URL(s) for more information.
openSUSE Leap 42.3
Please install the updated packages.
Common Vulnerability Exposure (CVE) ID: CVE-2018-1128|
Debian Security Information: DSA-4339 (Google Search)
RedHat Security Advisories: RHSA-2018:2177
RedHat Security Advisories: RHSA-2018:2179
RedHat Security Advisories: RHSA-2018:2261
RedHat Security Advisories: RHSA-2018:2274
SuSE Security Announcement: openSUSE-SU-2019:1284 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2018-1129
Common Vulnerability Exposure (CVE) ID: CVE-2018-6554
BugTraq ID: 105302
Debian Security Information: DSA-4308 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2018-6555
BugTraq ID: 105304
Common Vulnerability Exposure (CVE) ID: CVE-2018-9363
RedHat Security Advisories: RHSA-2018:2948
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.