Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2020.2623.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2020:2623-1) |
Summary: | The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2020:2623-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2020:2623-1 advisory. Vulnerability Insight: The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629). CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798). CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213). CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205). CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757). CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518). CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988). CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069). The following non-security bugs were fixed: btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784). cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428). cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428). cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428). cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428). cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428). cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428). cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428). cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428). cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428). Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127). ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459). ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515). ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515). ipvs: fix the connection sync failed in some cases (bsc#1174699). kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629). kabi: mask changes to struct ipv6_stub (bsc#1165629). mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366). mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691). ocfs2: add trimfs dlm lock resource (bsc#1175228). ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228). ocfs2: avoid inode removal while nfsd ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'Linux Kernel' package(s) on SUSE Linux Enterprise High Availability 12-SP4, SUSE Linux Enterprise Live Patching 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server for SAP 12-SP4, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 9. Solution: Please install the updated package(s). CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-1749 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1749 |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |