Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2018.2539.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2018:2539-1) |
Summary: | The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2018:2539-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2018:2539-1 advisory. Vulnerability Insight: The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296). - CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322). - CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292). - CVE-2018-10853: A KVM guest userspace to guest kernel write was fixed, which could be used by guest users to crash the guest kernel (bnc#1097104). The following non-security bugs were fixed: - acpi / apei: Remove ghes_ioremap_area (bsc#1051510). - acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bsc#1051510). - acpi / pm: save NVS memory for ASUS 1025C laptop (bsc#1051510). - affs_lookup(): close a race with affs_remove_link() (bsc#1105355). - alsa: cs5535audio: Fix invalid endian conversion (bsc#1051510). - alsa: hda: Correct Asrock B85M-ITX power_save blacklist entry (bsc#1051510). - alsa: hda - Sleep for 10ms after entering D3 on Conexant codecs (bsc#1051510). - alsa: hda - Turn CX8200 into D3 as well upon reboot (bsc#1051510). - alsa: memalloc: Do not exceed over the requested size (bsc#1051510). - alsa: snd-aoa: add of_node_put() in error path (bsc#1051510). - alsa: virmidi: Fix too long output trigger loop (bsc#1051510). - alsa: vx222: Fix invalid endian conversions (bsc#1051510). - alsa: vxpocket: Fix invalid endian conversions (bsc#1051510). - arm64: enable thunderx gpio driver - arm/asm/tlb.h: Fix build error implicit func declaration (bnc#1105467 Reduce IPIs and atomic ops with improved lazy TLB). - asoc: dpcm: do not merge format from invalid codec dai (bsc#1051510). - asoc: es7134: remove 64kHz rate from the supported rates (bsc#1051510). - asoc: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver (bsc#1051510). - asoc: Intel: cht_bsw_max98090_ti: Fix jack initialization (bsc#1051510). - asoc: msm8916-wcd-digital: fix RX2 MIX1 and RX3 MIX1 (bsc#1051510). - asoc: rsnd: cmd: Add missing newline to debug message (bsc#1051510). - asoc: sirf: Fix potential NULL pointer dereference (bsc#1051510). - asoc: zte: Fix incorrect PCM format bit usages (bsc#1051510). - ata: Fix ZBC_OUT all bit handling (bsc#1051510). - ata: Fix ZBC_OUT command block check (bsc#1051510). - ath10k: prevent active scans ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'Linux Kernel' package(s) on SUSE Linux Enterprise High Availability 15, SUSE Linux Enterprise Module for Basesystem 15, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Legacy Software 15, SUSE Linux Enterprise Workstation Extension 15. Solution: Please install the updated package(s). CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-9363 Debian Security Information: DSA-4308 (Google Search) https://www.debian.org/security/2018/dsa-4308 https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html RedHat Security Advisories: RHSA-2018:2948 https://access.redhat.com/errata/RHSA-2018:2948 RedHat Security Advisories: RHSA-2019:2029 https://access.redhat.com/errata/RHSA-2019:2029 RedHat Security Advisories: RHSA-2019:2043 https://access.redhat.com/errata/RHSA-2019:2043 https://usn.ubuntu.com/3797-1/ https://usn.ubuntu.com/3797-2/ https://usn.ubuntu.com/3820-1/ https://usn.ubuntu.com/3820-2/ https://usn.ubuntu.com/3820-3/ https://usn.ubuntu.com/3822-1/ https://usn.ubuntu.com/3822-2/ |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |