Description: | Summary: The remote host is missing an update for the 'Linux kernel' package(s) announced via the SUSE-SU-2014:1698-1 advisory.
Vulnerability Insight: The SUSE Linux Enterprise 11 Service Pack 2 LTSS kernel has been updated to fix security issues on kernels on the x86_64 architecture.
The following security bugs have been fixed:
*
CVE-2014-9322: A local privilege escalation in the x86_64 32bit compatibility signal handling was fixed, which could have been used by local attackers to crash the machine or execute code.
*
CVE-2014-9090: The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel did not properly handle faults associated with the Stack Segment (SS) segment register, which allowed local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the 1 -clock-tests test suite.
*
CVE-2014-8133: Insufficient validation of TLS register usage could have leaked information from the kernel stack to userspace.
Security Issues:
* CVE-2014-8133 * CVE-2014-9090 * CVE-2014-9322
Affected Software/OS: 'Linux kernel' package(s) on SUSE Linux Enterprise Server 11-SP1, SUSE Linux Enterprise Server 11-SP2.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|