Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.4.2017.1613.1
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory (SUSE-SU-2017:1613-1)
Resumen:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2017:1613-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2017:1613-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security fixes.
The following security bugs were fixed:
- CVE-2017-1000364: The default stack guard page was too small and could
be 'jumped over' by userland programs using more than one page of stack
in functions and so lead to memory corruption. This update extends the
stack guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to
reduce this attack vector. This is not a kernel bugfix, but a hardening
measure against this kind of userland attack.(bsc#1039348)
- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous
pages, which allowed local users to gain privileges or cause a denial of
service (page tainting) via a crafted application that triggers writing
to page zero (bnc#979021).

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 11-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-3288
BugTraq ID: 93591
http://www.securityfocus.com/bid/93591
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.