English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.852048
Category:SuSE Local Security Checks
Title:SuSE Update for the openSUSE-SU-2018:2242-1 (the)
Summary:The remote host is missing an update for the 'the'; package(s) announced via the openSUSE-SU-2018:2242_1 advisory.
Description:Summary:
The remote host is missing an update for the 'the'
package(s) announced via the openSUSE-SU-2018:2242_1 advisory.

Vulnerability Insight:
The openSUSE Leap 15.0 kernel was updated
to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5390 aka 'SegmentSmack': A remote attacker even with relatively
low bandwidth could have caused lots of CPU usage by triggering the
worst case scenario during IP and/or TCP fragment reassembly
(bsc#1102340)

- CVE-2017-18344: The timer_create syscall implementation in
kernel/time/posix-timers.c in the Linux kernel doesn't properly validate
the sigevent- sigev_notify field, which leads to out-of-bounds access in
the show_timer function (called when /proc/$PID/timers is read). This
allowed userspace applications to read arbitrary kernel memory (on a
kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE)
(bnc#1102851).

The following non-security bugs were fixed:

- acpi, APEI, EINJ: Subtract any matching Register Region from Trigger
resources (bsc#1051510).

- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value
(bsc#1051510).

- acpi, nfit: Fix scrub idle detection (bsc#1094119).

- acpi / processor: Finish making acpi_processor_ppc_has_changed() void
(bsc#1051510).

- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS
(bsc#1051510).

- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).

- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).

- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).

- alsa: hda: add mute led support for HP ProBook 455 G5 (bsc#1051510).

- alsa: hda - Handle pm failure during hotplug (bsc#1051510).

- alsa: hda/realtek - Add Panasonic CF-SZ6 headset jack quirk
(bsc#1051510).

- alsa: hda/realtek - two more lenovo models need fixup of MIC_LOCATION
(bsc#1051510).

- alsa: hda/realtek - Yet another Clevo P950 quirk entry (bsc#1101143).

- alsa: rawmidi: Change resized buffers atomically (bsc#1051510).

- alsa: usb-audio: Apply rate limit to warning messages in URB complete
callback (bsc#1051510).

- alx: take rtnl before calling __alx_open from resume (bsc#1051510).

- arm64: Correct type for PUD macros (bsc#1103723).

- arm64: Disable unhandled signal log messages by default (bsc#1103724).

- arm64: kpti: Use early_param for kpti= command-line option (bsc#1103220).

- arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).

- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).

- arm64: perf: correct PMUVer probing (bsc#1103727).

- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails
(bsc#1103728).

- arm64: spinlock: Fix theoretical tryl ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
the on openSUSE Leap 15.0.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-5390
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
Cisco Security Advisory: 20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp
Debian Security Information: DSA-4266 (Google Search)
https://www.debian.org/security/2018/dsa-4266
RedHat Security Advisories: RHSA-2018:2384
https://access.redhat.com/errata/RHSA-2018:2384
RedHat Security Advisories: RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2395
RedHat Security Advisories: RHSA-2018:2402
https://access.redhat.com/errata/RHSA-2018:2402
RedHat Security Advisories: RHSA-2018:2403
https://access.redhat.com/errata/RHSA-2018:2403
RedHat Security Advisories: RHSA-2018:2645
https://access.redhat.com/errata/RHSA-2018:2645
RedHat Security Advisories: RHSA-2018:2776
https://access.redhat.com/errata/RHSA-2018:2776
RedHat Security Advisories: RHSA-2018:2785
https://access.redhat.com/errata/RHSA-2018:2785
RedHat Security Advisories: RHSA-2018:2789
https://access.redhat.com/errata/RHSA-2018:2789
RedHat Security Advisories: RHSA-2018:2790
https://access.redhat.com/errata/RHSA-2018:2790
RedHat Security Advisories: RHSA-2018:2791
https://access.redhat.com/errata/RHSA-2018:2791
RedHat Security Advisories: RHSA-2018:2924
https://access.redhat.com/errata/RHSA-2018:2924
RedHat Security Advisories: RHSA-2018:2933
https://access.redhat.com/errata/RHSA-2018:2933
RedHat Security Advisories: RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:2948
https://usn.ubuntu.com/3732-1/
https://usn.ubuntu.com/3732-2/
https://usn.ubuntu.com/3741-1/
https://usn.ubuntu.com/3742-1/
https://usn.ubuntu.com/3742-2/
https://usn.ubuntu.com/3741-2/
https://usn.ubuntu.com/3763-1/
CERT/CC vulnerability note: VU#962459
https://www.kb.cert.org/vuls/id/962459
BugTraq ID: 104976
http://www.securityfocus.com/bid/104976
http://www.securitytracker.com/id/1041424
http://www.securitytracker.com/id/1041434
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.