![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.851566 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for kernel (openSUSE-SU-2017:1513-1) |
Summary: | The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the referenced advisory. Vulnerability Insight: The openSUSE Leap 42.2 kernel was updated to 4.4.70 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885). - CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069). - CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883). - CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882). - CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544). - CVE-2017-9150: The do_check function in kernel/bpf/verifier.c in the Linux kernel did not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allowed local users to obtain sensitive address information via crafted bpf system calls (bnc#1040279). - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670) The following non-security bugs were fixed: - 9p: fix a potential acl leak (4.4.68 sta ... Description truncated, for more information please check the Reference URL Affected Software/OS: the on openSUSE Leap 42.2 Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-7487 1039237 http://www.securitytracker.com/id/1039237 98439 http://www.securityfocus.com/bid/98439 DSA-3886 http://www.debian.org/security/2017/dsa-3886 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee0d8d8482345ff97a75a7d747efc309f13b0d80 https://bugzilla.redhat.com/show_bug.cgi?id=1447734 https://github.com/torvalds/linux/commit/ee0d8d8482345ff97a75a7d747efc309f13b0d80 https://patchwork.ozlabs.org/patch/757549/ https://source.android.com/security/bulletin/2017-09-01 Common Vulnerability Exposure (CVE) ID: CVE-2017-7645 BugTraq ID: 97950 http://www.securityfocus.com/bid/97950 Debian Security Information: DSA-3886 (Google Search) https://marc.info/?l=linux-nfs&m=149218228327497&w=2 https://marc.info/?l=linux-nfs&m=149247516212924&w=2 RedHat Security Advisories: RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1615 RedHat Security Advisories: RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616 RedHat Security Advisories: RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2017:1647 RedHat Security Advisories: RHSA-2018:1319 https://access.redhat.com/errata/RHSA-2018:1319 https://usn.ubuntu.com/3754-1/ Common Vulnerability Exposure (CVE) ID: CVE-2017-8890 BugTraq ID: 98562 http://www.securityfocus.com/bid/98562 RedHat Security Advisories: RHSA-2017:1842 https://access.redhat.com/errata/RHSA-2017:1842 RedHat Security Advisories: RHSA-2017:2077 https://access.redhat.com/errata/RHSA-2017:2077 RedHat Security Advisories: RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2669 RedHat Security Advisories: RHSA-2018:1854 https://access.redhat.com/errata/RHSA-2018:1854 Common Vulnerability Exposure (CVE) ID: CVE-2017-9074 BugTraq ID: 98577 http://www.securityfocus.com/bid/98577 RedHat Security Advisories: RHSA-2018:0169 https://access.redhat.com/errata/RHSA-2018:0169 Common Vulnerability Exposure (CVE) ID: CVE-2017-9075 BugTraq ID: 98597 http://www.securityfocus.com/bid/98597 Common Vulnerability Exposure (CVE) ID: CVE-2017-9076 BugTraq ID: 98586 http://www.securityfocus.com/bid/98586 Common Vulnerability Exposure (CVE) ID: CVE-2017-9077 BugTraq ID: 98583 http://www.securityfocus.com/bid/98583 Common Vulnerability Exposure (CVE) ID: CVE-2017-9150 BugTraq ID: 98635 http://www.securityfocus.com/bid/98635 https://www.exploit-db.com/exploits/42048/ http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0e57697f162da4aa218b5feafe614fb666db07 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.1 https://bugs.chromium.org/p/project-zero/issues/detail?id=1251 https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |