Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2019:14051-1)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2019:14051-1 advisory.
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2019:14051-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)
CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)

CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)

CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)

CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out [link moved to references]

The following security bugs were fixed:
CVE-2019-9213: The expand_downwards function in mm/mmap.c lacked a check
for the mmap minimum address, which made it easier for attackers to
exploit kernel NULL pointer dereferences on non-SMAP platforms. This is
related to a capability check for the wrong task (bnc#1128166).

CVE-2013-0216: The Xen netback functionality allowed guest OS users to
cause a denial of service (loop) by triggering ring pointer corruption

CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver
(drivers/xen/pciback/conf_space_capability_msi.c) in Xen allowed guest
OS users with PCI device access to cause a denial of service via a large
number of kernel log messages. (bnc#801178).

CVE-2012-3430: The rds_recvmsg function in net/rds/recv.c did not
initialize a certain structure member, which allowed local users to
obtain potentially sensitive information from kernel stack memory via a
recvfrom or recvmsg system call on an RDS socket (bnc#773383).

CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver allowed remote
attackers to cause a denial of service (DMA descriptor consumption and
network-controller outage) via crafted TCP packets that trigger a small
MSS value (bnc#774523).

CVE-2013-0160: The kernel allowed local users to obtain sensitive
information about keystroke timing by using the inotify API on the
/dev/ptmx device (bnc#797175).

CVE-2013-1979: The scm_set_cred function in include/net/scm.h uses
incorrect uid and gid values during credentials passing, which allowed
local users to gain privileges via a crafted application (bnc#816708).

The following non-security bugs were fixed:
Add opcodes from net: filter: BPF 'JIT' compiler for PPC64 (bsc#1131107).

EHCI: improved logic for isochronous scheduling (bsc#1117515).

KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup

USB: Add new USB LPM helpers (bsc#1129770).

USB: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).

USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).

USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).

USB: EHCI: add symbolic constants for QHs (bsc#1... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Debuginfo 11-SP4

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-3412
RedHat Security Advisories: RHSA-2012:1323
RedHat Security Advisories: RHSA-2012:1324
RedHat Security Advisories: RHSA-2012:1347
RedHat Security Advisories: RHSA-2012:1375
RedHat Security Advisories: RHSA-2012:1401
RedHat Security Advisories: RHSA-2012:1430
SuSE Security Announcement: SUSE-SU-2012:1679 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1330 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2012-3430
Common Vulnerability Exposure (CVE) ID: CVE-2013-0160
SuSE Security Announcement: SUSE-SU-2013:0674 (Google Search)
SuSE Security Announcement: SUSE-SU-2013:1182 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0395 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0925 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:1187 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2013-0216
Common Vulnerability Exposure (CVE) ID: CVE-2013-0231
BugTraq ID: 57740
Debian Security Information: DSA-2632 (Google Search)
XForce ISS Database: xen-pcibackenablemsi-dos(81923)
Common Vulnerability Exposure (CVE) ID: CVE-2013-1979
SuSE Security Announcement: SUSE-SU-2014:1316 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:1319 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:1971 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2019-9213
BugTraq ID: 107296
RedHat Security Advisories: RHSA-2019:0831
RedHat Security Advisories: RHSA-2019:1479
RedHat Security Advisories: RHSA-2019:1480
SuSE Security Announcement: openSUSE-SU-2019:1085 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:1193 (Google Search)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.