openSUSE Security Update : the Linux Kernel (openSUSE-2016-1438)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

The openSUSE 14.2 kernel was updated to receive various security and
bugfixes.

The following security bugs were fixed :

- CVE-2016-9576: A use-after-free vulnerability in the
SCSI generic driver allows users with write access to
/dev/sg* or /dev/bsg* to elevate their privileges
(bsc#1013604).

The following non-security bugs were fixed :

- 8250_pci: Fix potential use-after-free in error path
(bsc#1013001).

- block_dev: do not test bdev->bd_contains when it is not
stable (bsc#1008557).

- drm/i915/vlv: Disable HPD in
valleyview_crt_detect_hotplug() (bsc#1014120).

- drm/i915/vlv: Make intel_crt_reset() per-encoder
(bsc#1014120).

- drm/i915/vlv: Reset the ADPA in
vlv_display_power_well_init() (bsc#1014120).

- drm/i915: Enable polling when we do not have hpd
(bsc#1014120).

- i2c: designware-baytrail: Add support for cherrytrail
(bsc#1011913).

- i2c: designware-baytrail: Pass dw_i2c_dev into helper
functions (bsc#1011913).

- i2c: designware: Prevent runtime suspend during adapter
registration (bsc#1011913).

- i2c: designware: Use transfer timeout from ioctl
I2C_TIMEOUT (bsc#1011913).

- i2c: designware: retry transfer on transient failure
(bsc#1011913).

- powerpc/xmon: Add xmon command to dump process/task
similar to ps(1) (fate#322020).

- sched/fair: Fix incorrect task group ->load_avg
(bsc#981825).

- serial: 8250_pci: Detach low-level driver during PCI
error recovery (bsc#1013001).

- target: fix tcm_rbd_gen_it_nexus for emulated XCOPY
state (bsc#1003606).

- x86/PCI: VMD: Synchronize with RCU freeing MSI IRQ descs
(bsc#1006827).

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1003606
https://bugzilla.opensuse.org/show_bug.cgi?id=1006827
https://bugzilla.opensuse.org/show_bug.cgi?id=1008557
https://bugzilla.opensuse.org/show_bug.cgi?id=1011913
https://bugzilla.opensuse.org/show_bug.cgi?id=1013001
https://bugzilla.opensuse.org/show_bug.cgi?id=1013604
https://bugzilla.opensuse.org/show_bug.cgi?id=1014120
https://bugzilla.opensuse.org/show_bug.cgi?id=981825

Solution :

Update the affected the Linux Kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 95744 ()

Bugtraq ID:

CVE ID: CVE-2016-9576

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now