Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2018.3961.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2018:3961-1)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2018:3961-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2018:3961-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 15 azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
CVE-2018-9363: Fixed an integer overflow that could have been used for
an out of bounds write with no additional execution privileges needed.
User interaction is not needed for exploitation (bsc#1105292).

CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c was
fixed in drivers/staging/irda/net/af_irda.c that allowed local users to
cause a denial of service (ias_object use-after-free and system crash)
or possibly have unspecified other impact via an AF_IRDA socket
(bsc#1106511).

CVE-2018-6554: Fixed memory leak in the irda_bind function in
net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c that
allowed local users to cause a denial of service (memory consumption) by
repeatedly binding an AF_IRDA socket (bsc#1106509).

CVE-2018-18710: An information leak was fixed in cdrom_ioctl_select_disc
in drivers/cdrom/cdrom.c that could have been used by local attackers to
read kernel memory because a cast from unsigned long to int interferes
with bounds checking. This is similar to CVE-2018-10940 and
CVE-2018-16658 (bsc#1113751).

CVE-2018-18445: Fixed faulty computation of numeric bounds in the BPF
verifier that now permits out-of-bounds memory accesses because
adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit
right shifts (bsc#1112372).

CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c was
fixed that was vulnerable to sequence number overflows. An attacker can
trigger a use-after-free (and possibly gain privileges) via certain
thread creation, map, unmap, invalidation, and dereference operations.
(bsc#1108399).

CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in
drivers/cdrom/cdrom.c was fixed that could have leed to be used by local
attackers to read kernel memory because a cast from unsigned long to int
interferes with bounds checking. This is similar to CVE-2018-10940
(bsc#1107689).

CVE-2018-15572: The spectre_v2_select_mitigation function in
arch/x86/kernel/cpu/bugs.c was not always fill RSB upon a context
switch, which makes it easier for attackers to conduct
userspace-userspace spectreRSB attacks. (bsc#1102517)

CVE-2018-14633: A security flaw was fixed in the
chap_server_compute_md5() function in the ISCSI target code in a way an
authentication request from an ISCSI initiator is processed. An
unauthenticated remote attacker can cause a stack buffer overflow and
smash up to 17 bytes of the stack. The attack requires the iSCSI target
to be enabled on the victim host. Depending on how the target's code was
built (i.e. depending on a compiler, compile flags and hardware
architecture) an attack may lead to a system crash and thus to a
denial-of-service or possibly to a non-authorized access to data
exported by an iSCSI ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Module for Public Cloud 15.

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-16533
BugTraq ID: 102026
http://www.securityfocus.com/bid/102026
https://github.com/torvalds/linux/commit/f043bfc98c193c284e2cd768fefabe18ac2fed9b
https://groups.google.com/d/msg/syzkaller/CxkJ9QZgwlM/O3IOvAaGAwAJ
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://usn.ubuntu.com/3754-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-18224
BugTraq ID: 103353
http://www.securityfocus.com/bid/103353
Debian Security Information: DSA-4188 (Google Search)
https://www.debian.org/security/2018/dsa-4188
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3e4c56d41eef5595035872a2ec5a483f42e8917f
https://github.com/torvalds/linux/commit/3e4c56d41eef5595035872a2ec5a483f42e8917f
Common Vulnerability Exposure (CVE) ID: CVE-2018-10902
1041529
http://www.securitytracker.com/id/1041529
105119
http://www.securityfocus.com/bid/105119
DSA-4308
https://www.debian.org/security/2018/dsa-4308
RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3083
RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3096
RHSA-2019:0415
https://access.redhat.com/errata/RHSA-2019:0415
RHSA-2019:0641
https://access.redhat.com/errata/RHSA-2019:0641
RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2019:3217
RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2019:3967
USN-3776-1
https://usn.ubuntu.com/3776-1/
USN-3776-2
https://usn.ubuntu.com/3776-2/
USN-3847-1
https://usn.ubuntu.com/3847-1/
USN-3847-2
https://usn.ubuntu.com/3847-2/
USN-3847-3
https://usn.ubuntu.com/3847-3/
USN-3849-1
https://usn.ubuntu.com/3849-1/
USN-3849-2
https://usn.ubuntu.com/3849-2/
[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0
Common Vulnerability Exposure (CVE) ID: CVE-2018-10938
BugTraq ID: 105154
http://www.securityfocus.com/bid/105154
Debian Security Information: DSA-4308 (Google Search)
http://seclists.org/oss-sec/2018/q3/179
http://www.securitytracker.com/id/1041569
https://usn.ubuntu.com/3797-1/
https://usn.ubuntu.com/3797-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-10940
BugTraq ID: 104154
http://www.securityfocus.com/bid/104154
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
RedHat Security Advisories: RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:2948
RedHat Security Advisories: RHSA-2018:3083
RedHat Security Advisories: RHSA-2018:3096
https://usn.ubuntu.com/3676-1/
https://usn.ubuntu.com/3676-2/
https://usn.ubuntu.com/3695-1/
https://usn.ubuntu.com/3695-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-1128
Debian Security Information: DSA-4339 (Google Search)
https://www.debian.org/security/2018/dsa-4339
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
http://www.openwall.com/lists/oss-security/2020/11/17/3
http://www.openwall.com/lists/oss-security/2020/11/17/4
RedHat Security Advisories: RHSA-2018:2177
https://access.redhat.com/errata/RHSA-2018:2177
RedHat Security Advisories: RHSA-2018:2179
https://access.redhat.com/errata/RHSA-2018:2179
RedHat Security Advisories: RHSA-2018:2261
https://access.redhat.com/errata/RHSA-2018:2261
RedHat Security Advisories: RHSA-2018:2274
https://access.redhat.com/errata/RHSA-2018:2274
SuSE Security Announcement: openSUSE-SU-2019:1284 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-1129
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-12896
https://bugzilla.kernel.org/show_bug.cgi?id=200189
https://github.com/lcytxw/bug_repro/tree/master/bug_200189
https://github.com/torvalds/linux/commit/78c9c4dfbf8c04883941445a195276bb4bb92c76
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://usn.ubuntu.com/3848-1/
https://usn.ubuntu.com/3848-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-13093
https://bugzilla.kernel.org/show_bug.cgi?id=199367
https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=afca6c5b2595fc44383919fba740c194b0b76aff
https://github.com/torvalds/linux/commit/afca6c5b2595fc44383919fba740c194b0b76aff
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
RedHat Security Advisories: RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2029
RedHat Security Advisories: RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:2043
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-13095
https://bugzilla.kernel.org/show_bug.cgi?id=199915
https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=23fcb3340d033d9f081e21e6c12c2db7eaa541d3
https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3
RedHat Security Advisories: RHSA-2019:1350
https://access.redhat.com/errata/RHSA-2019:1350
Common Vulnerability Exposure (CVE) ID: CVE-2018-14613
BugTraq ID: 104917
http://www.securityfocus.com/bid/104917
https://bugzilla.kernel.org/show_bug.cgi?id=199849
https://patchwork.kernel.org/patch/10503147/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-14617
https://bugzilla.kernel.org/show_bug.cgi?id=200297
https://www.spinics.net/lists/linux-fsdevel/msg130021.html
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-14633
105388
http://www.securityfocus.com/bid/105388
RHSA-2018:3651
https://access.redhat.com/errata/RHSA-2018:3651
RHSA-2018:3666
https://access.redhat.com/errata/RHSA-2018:3666
RHSA-2019:1946
https://access.redhat.com/errata/RHSA-2019:1946
USN-3775-1
https://usn.ubuntu.com/3775-1/
USN-3775-2
https://usn.ubuntu.com/3775-2/
USN-3777-1
https://usn.ubuntu.com/3777-1/
USN-3777-2
https://usn.ubuntu.com/3777-2/
USN-3777-3
https://usn.ubuntu.com/3777-3/
USN-3779-1
https://usn.ubuntu.com/3779-1/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14633
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=1816494330a83f2a064499d8ed2797045641f92c
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=8c39e2699f8acb2e29782a834e56306da24937fe
https://seclists.org/oss-sec/2018/q3/270
Common Vulnerability Exposure (CVE) ID: CVE-2018-15572
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdf82a7856b32d905c39afc85e34364491e46346
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1
https://github.com/torvalds/linux/commit/fdf82a7856b32d905c39afc85e34364491e46346
Common Vulnerability Exposure (CVE) ID: CVE-2018-16658
BugTraq ID: 105334
http://www.securityfocus.com/bid/105334
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.6
https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
RedHat Security Advisories: RHSA-2019:4154
https://access.redhat.com/errata/RHSA-2019:4154
https://usn.ubuntu.com/3820-1/
https://usn.ubuntu.com/3820-2/
https://usn.ubuntu.com/3820-3/
https://usn.ubuntu.com/3822-1/
https://usn.ubuntu.com/3822-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-17182
BugTraq ID: 105417
http://www.securityfocus.com/bid/105417
BugTraq ID: 106503
http://www.securityfocus.com/bid/106503
https://www.exploit-db.com/exploits/45497/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
https://www.openwall.com/lists/oss-security/2018/09/18/4
RedHat Security Advisories: RHSA-2018:3656
https://access.redhat.com/errata/RHSA-2018:3656
http://www.securitytracker.com/id/1041748
Common Vulnerability Exposure (CVE) ID: CVE-2018-18386
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=966031f340185eddd05affcf72b740549f056348
https://bugzilla.suse.com/show_bug.cgi?id=1094825
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
https://github.com/torvalds/linux/commit/966031f340185eddd05affcf72b740549f056348
RedHat Security Advisories: RHSA-2019:0831
https://access.redhat.com/errata/RHSA-2019:0831
Common Vulnerability Exposure (CVE) ID: CVE-2018-18445
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b799207e1e1816b09e7a5920fbb2d5fcf6edd681
https://bugs.chromium.org/p/project-zero/issues/detail?id=1686
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.75
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.13
https://github.com/torvalds/linux/commit/b799207e1e1816b09e7a5920fbb2d5fcf6edd681
RedHat Security Advisories: RHSA-2019:0512
https://access.redhat.com/errata/RHSA-2019:0512
RedHat Security Advisories: RHSA-2019:0514
https://access.redhat.com/errata/RHSA-2019:0514
https://usn.ubuntu.com/3832-1/
https://usn.ubuntu.com/3835-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-18710
BugTraq ID: 106041
http://www.securityfocus.com/bid/106041
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://usn.ubuntu.com/3846-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-6554
BugTraq ID: 105302
http://www.securityfocus.com/bid/105302
https://www.spinics.net/lists/stable/msg255030.html
https://www.spinics.net/lists/stable/msg255034.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-6555
BugTraq ID: 105304
http://www.securityfocus.com/bid/105304
https://www.spinics.net/lists/stable/msg255031.html
https://www.spinics.net/lists/stable/msg255035.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-9363
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.