openSUSE Security Update : the Linux Kernel (openSUSE-2017-286)

High Nessus Plugin ID 97366

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.4

Synopsis

The remote openSUSE host is missing a security update.

Description

The openSUSE Leap 42.2 kernel was updated to 4.4.49 to receive various security and bugfixes.

The following security bugs were fixed :

- CVE-2017-5986: A userlevel triggerable BUG_ON on sctp_wait_for_sndbuf was fixed. (bsc#1025235)

- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).

- CVE-2017-5897: A potential remote denial of service within the IPv6 GRE protocol was fixed. (bsc#1023762)

- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to cause a denial of service (invalid free) or possibly have unspecified other impact via an application that makes an IPV6_RECVPKTINFO setsockopt system call. (bsc#1026024).

The following non-security bugs were fixed :

- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).

- iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884).

- kabi: protect struct tcp_fastopen_cookie (kabi).

- md: ensure md devices are freed before module is unloaded (bsc#1022304).

- md: Fix a regression reported by bsc#1020048 in patches.fixes/0003-md-lockless-I-O-submission-for-RAID1.
patch (bsc#982783,bsc#998106,bsc#1020048).

- net: ethtool: Initialize buffer when querying device channel settings (bsc#969479 FATE#320634).

- net: implement netif_cond_dbg macro (bsc#1019168).

- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).

- sfc: refactor debug-or-warnings printks (bsc#1019168).

- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).

- xfs: do not allow di_size with high bit set (bsc#1024234).

- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).

- xfs: fix broken multi-fsb buffer logging (bsc#1024081).

- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).

- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).

- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).

- xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508).

Solution

Update the affected the Linux Kernel packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1012382

https://bugzilla.opensuse.org/show_bug.cgi?id=1018100

https://bugzilla.opensuse.org/show_bug.cgi?id=1019168

https://bugzilla.opensuse.org/show_bug.cgi?id=1020048

https://bugzilla.opensuse.org/show_bug.cgi?id=1021082

https://bugzilla.opensuse.org/show_bug.cgi?id=1022181

https://bugzilla.opensuse.org/show_bug.cgi?id=1022304

https://bugzilla.opensuse.org/show_bug.cgi?id=1023762

https://bugzilla.opensuse.org/show_bug.cgi?id=1023884

https://bugzilla.opensuse.org/show_bug.cgi?id=1023888

https://bugzilla.opensuse.org/show_bug.cgi?id=1024081

https://bugzilla.opensuse.org/show_bug.cgi?id=1024234

https://bugzilla.opensuse.org/show_bug.cgi?id=1024508

https://bugzilla.opensuse.org/show_bug.cgi?id=1024938

https://bugzilla.opensuse.org/show_bug.cgi?id=1025235

https://bugzilla.opensuse.org/show_bug.cgi?id=1026024

https://bugzilla.opensuse.org/show_bug.cgi?id=969479

https://bugzilla.opensuse.org/show_bug.cgi?id=982783

https://bugzilla.opensuse.org/show_bug.cgi?id=989056

https://bugzilla.opensuse.org/show_bug.cgi?id=998106

Plugin Details

Severity: High

ID: 97366

File Name: openSUSE-2017-286.nasl

Version: 3.8

Type: local

Agent: unix

Published: 2017/02/24

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 9.4

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debugsource, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debugsource, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-docs-html, p-cpe:/a:novell:opensuse:kernel-docs-pdf, p-cpe:/a:novell:opensuse:kernel-macros, p-cpe:/a:novell:opensuse:kernel-obs-build, p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource, p-cpe:/a:novell:opensuse:kernel-obs-qa, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-base, p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/02/22

Exploitable With

Core Impact

Reference Information

CVE: CVE-2017-5897, CVE-2017-5970, CVE-2017-5986, CVE-2017-6074