Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2019:1744-1)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2019:1744-1 advisory.
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2019:1744-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.

This update adds support for the Hygon Dhyana CPU (fate#327735).

The following security bugs were fixed:
CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in
arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup
of prop->name, which might allow an attacker to cause a denial of
service (NULL pointer dereference and system crash) (bnc#1137194).

CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS
message sequence was fixed. (bnc#1137103).

CVE-2019-12817: On the PowerPC architecture, local attackers could
access other users processes memory (bnc#1138263).

The following non-security bugs were fixed:
6lowpan: Off by one handling ->nexthdr (bsc#1051510).

acpi: Add Hygon Dhyana support (fate#327735).

af_key: unconditionally clone on broadcast (bsc#1051510).

alsa: firewire-motu: fix destruction of data for isochronous resources

alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).

alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).

ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).

ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).

audit: fix a memory leak bug (bsc#1051510).

blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).

ceph: factor out ceph_lookup_inode() (bsc#1138681).

ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).

ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).

ceph: flush dirty inodes before proceeding with remount (bsc#1138681).

ceph: print inode number in __caps_issued_mask debugging messages

ceph: quota: fix quota subdir mounts (bsc#1138681).

ceph: remove duplicated filelock ref increase (bsc#1138681).

cfg80211: fix memory leak of wiphy device name (bsc#1051510).

cpufreq: Add Hygon Dhyana support (fate#327735).

cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).

cpu/topology: Export die_id (jsc#SLE-5454).

Do not restrict NFSv4.2 on openSUSE (bsc#1138719).

drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).

drbd: disconnect, if the wrong UUIDs are attached on a connected peer

drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).

drbd: skip spurious timeout (ping-timeo) when failing promote

drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource()
(bsc#1136333 jsc#SLE-4994).

drivers: fix a typo in the kernel doc for
devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).

drivers: provide devm_platform_ioremap_resource() (bsc#1136333

drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error
handling path in 'rio_dma_transfer()' (bsc#1051510).

drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen()

drive... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Workstation Extension 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1, SUSE Linux Enterprise Module for Live Patching 15-SP1, SUSE Linux Enterprise Module for Legacy Software 15-SP1, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Basesystem 15-SP1, SUSE Linux Enterprise High Availability 15-SP1

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-16871
Common Vulnerability Exposure (CVE) ID: CVE-2019-12614
Common Vulnerability Exposure (CVE) ID: CVE-2019-12817
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.