Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2019.1244.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2019:1244-1) |
Summary: | The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2019:1244-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2019:1244-1 advisory. Vulnerability Insight: The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes. Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331) CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS) CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS) CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS) CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel. For more information on this set of vulnerabilities, check out [link moved to references] The following security issues were fixed: CVE-2018-16880: A flaw was found in the handle_rx() function in the vhost_net driver. A malicious virtual guest, under specific conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (bnc#1122767). CVE-2019-3882: A flaw was found in the vfio interface implementation that permitted violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). (bnc#1131416 bnc#1131427). CVE-2019-9003: Attackers could trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a 'service ipmievd restart' loop (bnc#1126704). CVE-2019-9500: A brcmfmac heap buffer overflow in brcmf_wowl_nd_results was fixed. (bnc#1132681). CVE-2019-9503: A brcmfmac frame validation bypass was fixed. (bnc#1132828). The following non-security bugs were fixed: 9p: do not trust pdu content for stat item size (bsc#1051510). acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399). acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1132426). acpi / SBS: Fix GPE storm on recent MacBookPro's (bsc#1051510). alsa: core: Fix card races between register and disconnect (bsc#1051510). alsa: echoaudio: add a check for ioremap_nocache (bsc#1051510). alsa: firewire: add const qualifier to identifiers for read-only symbols (bsc#1051510). alsa: firewire-motu: add a flag for AES/EBU on XLR interface (bsc#1051510). alsa: firewire-motu: add specification flag for position of flag for MIDI messages (bsc#1051510). alsa: firewire-motu: add support for MOTU Audio Express (bsc#1051510). alsa: firewire-motu: add support for Motu Traveler (bsc#1051510). alsa: firewire-motu: use 'version' field of unit directory to identify model (bsc#1051510). alsa: hda - add Lenovo ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'Linux Kernel' package(s) on SUSE Linux Enterprise High Availability 15, SUSE Linux Enterprise Module for Basesystem 15, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Legacy Software 15, SUSE Linux Enterprise Module for Live Patching 15, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Workstation Extension 15. Solution: Please install the updated package(s). CVSS Score: 7.9 CVSS Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-3882 Bugtraq: 20190813 [SECURITY] [DSA 4497-1] linux security update (Google Search) https://seclists.org/bugtraq/2019/Aug/18 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3882 https://security.netapp.com/advisory/ntap-20190517-0005/ Debian Security Information: DSA-4497 (Google Search) https://www.debian.org/security/2019/dsa-4497 https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html RedHat Security Advisories: RHSA-2019:2029 https://access.redhat.com/errata/RHSA-2019:2029 RedHat Security Advisories: RHSA-2019:2043 https://access.redhat.com/errata/RHSA-2019:2043 RedHat Security Advisories: RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3309 RedHat Security Advisories: RHSA-2019:3517 https://access.redhat.com/errata/RHSA-2019:3517 SuSE Security Announcement: openSUSE-SU-2019:1404 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html SuSE Security Announcement: openSUSE-SU-2019:1407 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html SuSE Security Announcement: openSUSE-SU-2019:1479 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html https://usn.ubuntu.com/3979-1/ https://usn.ubuntu.com/3980-1/ https://usn.ubuntu.com/3980-2/ https://usn.ubuntu.com/3981-1/ https://usn.ubuntu.com/3981-2/ https://usn.ubuntu.com/3982-1/ https://usn.ubuntu.com/3982-2/ Common Vulnerability Exposure (CVE) ID: CVE-2019-9003 BugTraq ID: 107145 http://www.securityfocus.com/bid/107145 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77f8269606bf95fcb232ee86f6da80886f1dfae8 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.5 https://github.com/torvalds/linux/commit/77f8269606bf95fcb232ee86f6da80886f1dfae8 https://usn.ubuntu.com/3930-1/ https://usn.ubuntu.com/3930-2/ Common Vulnerability Exposure (CVE) ID: CVE-2019-9500 https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff https://kb.cert.org/vuls/id/166939/ Common Vulnerability Exposure (CVE) ID: CVE-2019-9503 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |