Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2014:0910-1)
Summary:The remote host is missing an update for the 'Linux kernel' package(s) announced via the SUSE-SU-2014:0910-1 advisory.
The remote host is missing an update for the 'Linux kernel' package(s) announced via the SUSE-SU-2014:0910-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues.

The following security bugs have been fixed:


CVE-2012-2372: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service
(BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interfaces own IP address, as demonstrated by rds-ping. (bnc#767610)


CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. (bnc#847652)


CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404)


CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (bnc#851426)


CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified
other impact by leveraging the CAP_SYS_ADMIN capability for a (1)
XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. (bnc#852553)


CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#869563)


CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173)


CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, whic... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux kernel' package(s) on SUSE Linux Enterprise Server 11 SP3, SUSE Linux Enterprise High Availability Extension 11 SP3, SUSE Linux Enterprise Desktop 11 SP3, SLE 11

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-2372
BugTraq ID: 54062
HPdes Security Advisory: HPSBGN02970
RedHat Security Advisories: RHSA-2012:0743
RedHat Security Advisories: RHSA-2012:1540
SuSE Security Announcement: SUSE-SU-2012:1679 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2013-2929
BugTraq ID: 64111
RedHat Security Advisories: RHSA-2014:0100
RedHat Security Advisories: RHSA-2014:0159
RedHat Security Advisories: RHSA-2014:0285
RedHat Security Advisories: RHSA-2018:1252
SuSE Security Announcement: SUSE-SU-2015:0481 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:0566 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2013-4299
RedHat Security Advisories: RHSA-2013:1436
RedHat Security Advisories: RHSA-2013:1449
RedHat Security Advisories: RHSA-2013:1450
RedHat Security Advisories: RHSA-2013:1460
RedHat Security Advisories: RHSA-2013:1490
RedHat Security Advisories: RHSA-2013:1519
RedHat Security Advisories: RHSA-2013:1520
RedHat Security Advisories: RHSA-2013:1783
RedHat Security Advisories: RHSA-2013:1860
SuSE Security Announcement: SUSE-SU-2015:0652 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2013-4579
Common Vulnerability Exposure (CVE) ID: CVE-2013-6382
BugTraq ID: 63889
Common Vulnerability Exposure (CVE) ID: CVE-2013-7339
BugTraq ID: 66351
Common Vulnerability Exposure (CVE) ID: CVE-2014-0055
BugTraq ID: 66441
RedHat Security Advisories: RHSA-2014:0328
RedHat Security Advisories: RHSA-2014:0339
Common Vulnerability Exposure (CVE) ID: CVE-2014-0077
BugTraq ID: 66678
Common Vulnerability Exposure (CVE) ID: CVE-2014-0101
BugTraq ID: 65943
RedHat Security Advisories: RHSA-2014:0419
RedHat Security Advisories: RHSA-2014:0432
Common Vulnerability Exposure (CVE) ID: CVE-2014-0131
Common Vulnerability Exposure (CVE) ID: CVE-2014-0155
Common Vulnerability Exposure (CVE) ID: CVE-2014-1444
BugTraq ID: 64952
XForce ISS Database: linux-kernel-cve20141444-info-disc(90443)
Common Vulnerability Exposure (CVE) ID: CVE-2014-1445
BugTraq ID: 64953
XForce ISS Database: linux-kernel-cve20141445-info-disc(90444)
Common Vulnerability Exposure (CVE) ID: CVE-2014-1446
BugTraq ID: 64954
XForce ISS Database: linux-kernel-cve20141446-info-disc(90445)
Common Vulnerability Exposure (CVE) ID: CVE-2014-1874
BugTraq ID: 65459
Common Vulnerability Exposure (CVE) ID: CVE-2014-2309
BugTraq ID: 66095
Common Vulnerability Exposure (CVE) ID: CVE-2014-2523
BugTraq ID: 66279
XForce ISS Database: linux-kernel-cve20142523-code-exec(91910)
Common Vulnerability Exposure (CVE) ID: CVE-2014-2678
BugTraq ID: 66543
Common Vulnerability Exposure (CVE) ID: CVE-2014-2851
BugTraq ID: 66779
Debian Security Information: DSA-2926 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-3122
BugTraq ID: 67162
Common Vulnerability Exposure (CVE) ID: CVE-2014-3144
BugTraq ID: 67309
Debian Security Information: DSA-2949 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-3145
BugTraq ID: 67321
Common Vulnerability Exposure (CVE) ID: CVE-2014-3917
RedHat Security Advisories: RHSA-2014:1143
RedHat Security Advisories: RHSA-2014:1281
Common Vulnerability Exposure (CVE) ID: CVE-2014-4508
BugTraq ID: 68126
SuSE Security Announcement: SUSE-SU-2014:1316 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:1319 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4652
RedHat Security Advisories: RHSA-2014:1083
RedHat Security Advisories: RHSA-2015:1272
XForce ISS Database: linux-kernel-cve20144652-info-disc(94412)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4653
BugTraq ID: 68164
Common Vulnerability Exposure (CVE) ID: CVE-2014-4654
BugTraq ID: 68162
Common Vulnerability Exposure (CVE) ID: CVE-2014-4655
Common Vulnerability Exposure (CVE) ID: CVE-2014-4656
RedHat Security Advisories: RHSA-2015:0087
Common Vulnerability Exposure (CVE) ID: CVE-2014-4699
Debian Security Information: DSA-2972 (Google Search)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.