Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2020.2623.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2020:2623-1)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2020:2623-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2020:2623-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup
(bsc#1165629).

CVE-2020-14314: Fixed a potential negative array index in do_split()
(bsc#1173798).

CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem
which could have led to privilege escalation (bsc#1175213).

CVE-2020-14331: Fixed a missing check in vgacon scrollback handling
(bsc#1174205).

CVE-2020-16166: Fixed a potential issue which could have allowed remote
attackers to make observations that help to obtain sensitive information
about the internal state of the network RNG (bsc#1174757).

CVE-2020-24394: Fixed an issue which could set incorrect permissions on
new filesystem objects when the filesystem lacks ACL support
(bsc#1175518).

CVE-2020-10135: Legacy pairing and secure-connections pairing
authentication Bluetooth might have allowed an unauthenticated user to
complete authentication without pairing credentials via adjacent access
(bsc#1171988).

CVE-2020-14386: Fixed a potential local privilege escalation via memory
corruption (bsc#1176069).

The following non-security bugs were fixed:

btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).

cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).

cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333
bsc#1172428).

cifs: fix double free error on share and prefix (bsc#1144333
bsc#1172428).

cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333
bsc#1172428).

cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect
(bsc#1144333 bsc#1172428).

cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect()
(bsc#1144333 bsc#1172428).

cifs: only update prefix path of DFS links in cifs_tree_connect()
(bsc#1144333 bsc#1172428).

cifs: reduce number of referral requests in DFS link lookups
(bsc#1144333 bsc#1172428).

cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).

Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops
(bsc#1175127).

ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).

ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL
(bsc#1175515).

ip_tunnel: allow not to count pkts on tstats by setting skb's dev to
NULL (bsc#1175515).

ipvs: fix the connection sync failed in some cases (bsc#1174699).

kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).

kabi: mask changes to struct ipv6_stub (bsc#1165629).

mm: Avoid calling build_all_zonelists_init under hotplug context
(bsc#1154366).

mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo
(bsc#1175691).

ocfs2: add trimfs dlm lock resource (bsc#1175228).

ocfs2: add trimfs lock to avoid duplicated trims in cluster
(bsc#1175228).

ocfs2: avoid inode removal while nfsd ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise High Availability 12-SP4, SUSE Linux Enterprise Live Patching 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server for SAP 12-SP4, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 9.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-1749
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1749
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.