Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2017:0494-1)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2017:0494-1 advisory.
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2017:0494-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not
verify that a setkey operation has been performed on an AF_ALG socket
before an accept system call is processed, which allowed local users to
cause a denial of service (NULL pointer dereference and system crash)
via a crafted application that did not supply a key, related to the
lrw_crypt function in crypto/lrw.c (bnc#1008374).
- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserves the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bnc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations or cause a denial of service (use-after-free) by
leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for
remote attackers to guess sequence numbers and cause a denial of service
(connection loss) to persistent TCP connections by repeatedly injecting
a TCP RST packet, especially in protocols that use long-lived
connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the
Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users
to gain privileges or cause a denial of service (heap-based buffer
overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel
networking subsystem could have enabled a local malicious application to
execute arbitrary code within the context of the kernel bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt
system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibl... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux Kernel' package(s) on SUSE OpenStack Cloud 5, SUSE Manager Proxy 2.1, SUSE Manager 2.1, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP3

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0230
BugTraq ID: 10183
Bugtraq: 20040425 Perl code exploting TCP not checking RST ACK. (Google Search)
Cert/CC Advisory: TA04-111A
CERT/CC vulnerability note: VU#415294
Cisco Security Advisory: 20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products
HPdes Security Advisory: HPSBST02161
HPdes Security Advisory: SSRT061264
HPdes Security Advisory: SSRT4696
Microsoft Security Bulletin: MS05-019
Microsoft Security Bulletin: MS06-064
NETBSD Security Advisory: NetBSD-SA2004-006
SCO Security Bulletin: SCOSA-2005.14
SCO Security Bulletin: SCOSA-2005.3
SCO Security Bulletin: SCOSA-2005.9
SGI Security Advisory: 20040403-01-A
XForce ISS Database: tcp-rst-dos(15886)
Common Vulnerability Exposure (CVE) ID: CVE-2012-6704
BugTraq ID: 95135
Common Vulnerability Exposure (CVE) ID: CVE-2015-1350
BugTraq ID: 76075
Common Vulnerability Exposure (CVE) ID: CVE-2015-8956
BugTraq ID: 93326
RedHat Security Advisories: RHSA-2016:2574
RedHat Security Advisories: RHSA-2016:2584
Common Vulnerability Exposure (CVE) ID: CVE-2015-8962
BugTraq ID: 94187
Common Vulnerability Exposure (CVE) ID: CVE-2015-8964
BugTraq ID: 94138
Common Vulnerability Exposure (CVE) ID: CVE-2015-8970
BugTraq ID: 94217
RedHat Security Advisories: RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
RedHat Security Advisories: RHSA-2017:2437
RedHat Security Advisories: RHSA-2017:2444
Common Vulnerability Exposure (CVE) ID: CVE-2016-0823
BugTraq ID: 84265
Common Vulnerability Exposure (CVE) ID: CVE-2016-3841
BugTraq ID: 92227
RedHat Security Advisories: RHSA-2016:0855
RedHat Security Advisories: RHSA-2016:2695
Common Vulnerability Exposure (CVE) ID: CVE-2016-6828
BugTraq ID: 92452
RedHat Security Advisories: RHSA-2017:0036
RedHat Security Advisories: RHSA-2017:0086
RedHat Security Advisories: RHSA-2017:0091
RedHat Security Advisories: RHSA-2017:0113
Common Vulnerability Exposure (CVE) ID: CVE-2016-7042
BugTraq ID: 93544
RedHat Security Advisories: RHSA-2017:0817
RedHat Security Advisories: RHSA-2017:2669
Common Vulnerability Exposure (CVE) ID: CVE-2016-7097
BugTraq ID: 92659
Common Vulnerability Exposure (CVE) ID: CVE-2016-7117
BugTraq ID: 93304
RedHat Security Advisories: RHSA-2016:2962
RedHat Security Advisories: RHSA-2017:0031
RedHat Security Advisories: RHSA-2017:0065
RedHat Security Advisories: RHSA-2017:0196
RedHat Security Advisories: RHSA-2017:0215
RedHat Security Advisories: RHSA-2017:0216
RedHat Security Advisories: RHSA-2017:0217
RedHat Security Advisories: RHSA-2017:0270
Common Vulnerability Exposure (CVE) ID: CVE-2016-7425
BugTraq ID: 93037
Common Vulnerability Exposure (CVE) ID: CVE-2016-7910
BugTraq ID: 94135
RedHat Security Advisories: RHSA-2017:0892
RedHat Security Advisories: RHSA-2017:1297
RedHat Security Advisories: RHSA-2017:1298
RedHat Security Advisories: RHSA-2017:1308
Common Vulnerability Exposure (CVE) ID: CVE-2016-7911
Common Vulnerability Exposure (CVE) ID: CVE-2016-7916
Common Vulnerability Exposure (CVE) ID: CVE-2016-8399
BugTraq ID: 94708
RedHat Security Advisories: RHSA-2017:0869
RedHat Security Advisories: RHSA-2017:2930
RedHat Security Advisories: RHSA-2017:2931
Common Vulnerability Exposure (CVE) ID: CVE-2016-8632
BugTraq ID: 94211
Common Vulnerability Exposure (CVE) ID: CVE-2016-8633
BugTraq ID: 94149
RedHat Security Advisories: RHSA-2018:0676
RedHat Security Advisories: RHSA-2018:1062
RedHat Security Advisories: RHSA-2019:1170
RedHat Security Advisories: RHSA-2019:1190
Common Vulnerability Exposure (CVE) ID: CVE-2016-8646
BugTraq ID: 94309
Common Vulnerability Exposure (CVE) ID: CVE-2016-9555
BugTraq ID: 94479
RedHat Security Advisories: RHSA-2017:0307
SuSE Security Announcement: SUSE-SU-2016:3096 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3113 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3116 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3117 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3169 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3183 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3197 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3205 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3206 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3247 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-9576
BugTraq ID: 94821
SuSE Security Announcement: SUSE-SU-2016:3146 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3188 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3203 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3217 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3248 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3252 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:3085 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:3086 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:3118 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-9685
BugTraq ID: 94593
Common Vulnerability Exposure (CVE) ID: CVE-2016-9756
BugTraq ID: 94615
SuSE Security Announcement: openSUSE-SU-2017:0002 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-9793
BugTraq ID: 94655
RedHat Security Advisories: RHSA-2017:0931
RedHat Security Advisories: RHSA-2017:0932
RedHat Security Advisories: RHSA-2017:0933
Common Vulnerability Exposure (CVE) ID: CVE-2017-5551
BugTraq ID: 95717
Debian Security Information: DSA-3791 (Google Search)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.