Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2020.2497.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2020:2497-1) |
Summary: | The remote host is missing an update for the 'Linux Kernel (Live Patch 29 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2020:2497-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Linux Kernel (Live Patch 29 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2020:2497-1 advisory. Vulnerability Insight: This update for the Linux Kernel 4.4.180-94_107 fixes several issues. The following security issues were fixed: CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247). CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663). CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659). CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963). CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942). CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869). CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867). CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661). CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100). Affected Software/OS: 'Linux Kernel (Live Patch 29 for SLE 12 SP3)' package(s) on SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Server for SAP 12-SP3. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-0155 Bugtraq: 20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01) (Google Search) https://seclists.org/bugtraq/2019/Nov/26 http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html RedHat Security Advisories: RHSA-2019:3841 https://access.redhat.com/errata/RHSA-2019:3841 RedHat Security Advisories: RHSA-2019:3887 https://access.redhat.com/errata/RHSA-2019:3887 RedHat Security Advisories: RHSA-2019:3889 https://access.redhat.com/errata/RHSA-2019:3889 RedHat Security Advisories: RHSA-2019:3908 https://access.redhat.com/errata/RHSA-2019:3908 RedHat Security Advisories: RHSA-2020:0204 https://access.redhat.com/errata/RHSA-2020:0204 https://usn.ubuntu.com/4186-2/ Common Vulnerability Exposure (CVE) ID: CVE-2019-9458 https://source.android.com/security/bulletin/pixel/2019-09-01 SuSE Security Announcement: openSUSE-SU-2020:0543 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |