Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2018.0340
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2018-0340)
Zusammenfassung:The remote host is missing an update for the 'kernel-tmb' package(s) announced via the MGASA-2018-0340 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel-tmb' package(s) announced via the MGASA-2018-0340 advisory.

Vulnerability Insight:
This kernel-tmb update is based on the upstream 4.14.62 and fixes at least
the following security issues:

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1,
kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the
Linux kernel's KVM hypervisor handled exceptions delivered after a stack
switch operation via Mov SS or Pop SS instructions. During the stack switch
operation, the processor did not deliver interrupts and exceptions, rather
they are delivered once the first instruction after the stack switch is
executed. An unprivileged KVM guest user could use this flaw to crash the
guest or, potentially, escalate their privileges in the guest
(CVE-2018-1087).

Linux kernel vhost since version 4.8 does not properly initialize memory in
messages passed between virtual guests and the host operating system in the
vhost/vhost.c:vhost_new_msg() function. This can allow local privileged
users to read some kernel memory contents when reading from the
/dev/vhost-net device file (CVE-2018-1118).

Security researchers from FICORA have identified a remote denial of
service attack against the Linux kernel caused by inefficient
implementation of TCP segment reassembly, named 'SegmentSmack'.
A remote attacker could consume a lot of CPU resources in the kernel
networking stack with just a low bandwidth or single host attack by
using lots of small TCP segments packets. Usually large botnets are
needed for similar effect. The rate needed for this denial of service
attack to be effective is several magnitudes lower than the usual
packet processing capability of the machine, as the attack exploits
worst case behaviour of existing algorithms (CVE-2018-5390).
In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c
in the Linux kernel through 4.15, an integer signedness error allows
arbitrary information leakage for the FBIOPUTCMAP_SPARC and
FBIOGETCMAP_SPARC commands (CVE-2018-6412).

In some circumstances, some operating systems or hypervisors may not expect
or properly handle an Intel architecture hardware debug exception. The error
appears to be due to developer interpretation of existing documentation for
certain Intel architecture interrupt/exception instructions, namely MOV SS
and POP SS. An authenticated attacker may be able to read sensitive data in
memory or control low-level operating system functions (CVE-2018-8897).

Linux kernel is vulnerable to a heap-based buffer overflow in the
fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit
this by operating on a mounted crafted ext4 image (CVE-2018-10840).

The kvm functions that were used in the emulation of fxrstor, fxsave,
sgdt and sidt were originally meant for task switching, and as such they
did not check privilege levels. This allowed guest userspace to guest
kernel write (CVE-2018-10853).

A flaw was found in Linux kernel ext4 File System. A use-after-free ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel-tmb' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-10840
104858
http://www.securityfocus.com/bid/104858
RHSA-2019:0162
https://access.redhat.com/errata/RHSA-2019:0162
USN-3752-1
https://usn.ubuntu.com/3752-1/
USN-3752-2
https://usn.ubuntu.com/3752-2/
USN-3752-3
https://usn.ubuntu.com/3752-3/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10840
Common Vulnerability Exposure (CVE) ID: CVE-2018-10853
https://www.openwall.com/lists/oss-security/2018/09/02/1
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
RedHat Security Advisories: RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2029
RedHat Security Advisories: RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:2043
RedHat Security Advisories: RHSA-2020:0036
https://access.redhat.com/errata/RHSA-2020:0036
RedHat Security Advisories: RHSA-2020:0103
https://access.redhat.com/errata/RHSA-2020:0103
RedHat Security Advisories: RHSA-2020:0179
https://access.redhat.com/errata/RHSA-2020:0179
SuSE Security Announcement: openSUSE-SU-2019:1407 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
https://usn.ubuntu.com/3777-1/
https://usn.ubuntu.com/3777-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-1087
BugTraq ID: 104127
http://www.securityfocus.com/bid/104127
Debian Security Information: DSA-4196 (Google Search)
https://www.debian.org/security/2018/dsa-4196
http://www.openwall.com/lists/oss-security/2018/05/08/5
https://access.redhat.com/security/vulnerabilities/pop_ss
RedHat Security Advisories: RHSA-2018:1318
https://access.redhat.com/errata/RHSA-2018:1318
RedHat Security Advisories: RHSA-2018:1345
https://access.redhat.com/errata/RHSA-2018:1345
RedHat Security Advisories: RHSA-2018:1347
https://access.redhat.com/errata/RHSA-2018:1347
RedHat Security Advisories: RHSA-2018:1348
https://access.redhat.com/errata/RHSA-2018:1348
RedHat Security Advisories: RHSA-2018:1355
https://access.redhat.com/errata/RHSA-2018:1355
RedHat Security Advisories: RHSA-2018:1524
https://access.redhat.com/errata/RHSA-2018:1524
http://www.securitytracker.com/id/1040862
https://usn.ubuntu.com/3641-1/
https://usn.ubuntu.com/3641-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-10876
104904
http://www.securityfocus.com/bid/104904
106503
http://www.securityfocus.com/bid/106503
RHSA-2019:0525
https://access.redhat.com/errata/RHSA-2019:0525
USN-3753-1
https://usn.ubuntu.com/3753-1/
USN-3753-2
https://usn.ubuntu.com/3753-2/
USN-3871-1
https://usn.ubuntu.com/3871-1/
USN-3871-3
https://usn.ubuntu.com/3871-3/
USN-3871-4
https://usn.ubuntu.com/3871-4/
USN-3871-5
https://usn.ubuntu.com/3871-5/
[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
http://patchwork.ozlabs.org/patch/929239/
https://bugzilla.kernel.org/show_bug.cgi?id=199403
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c
Common Vulnerability Exposure (CVE) ID: CVE-2018-10877
104878
http://www.securityfocus.com/bid/104878
RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:2948
USN-3754-1
https://usn.ubuntu.com/3754-1/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877
Common Vulnerability Exposure (CVE) ID: CVE-2018-10879
104902
http://www.securityfocus.com/bid/104902
RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3083
RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3096
http://patchwork.ozlabs.org/patch/928666/
http://patchwork.ozlabs.org/patch/928667/
https://bugzilla.kernel.org/show_bug.cgi?id=200001
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
Common Vulnerability Exposure (CVE) ID: CVE-2018-10880
104907
http://www.securityfocus.com/bid/104907
USN-3821-1
https://usn.ubuntu.com/3821-1/
USN-3821-2
https://usn.ubuntu.com/3821-2/
http://patchwork.ozlabs.org/patch/930639/
https://bugzilla.kernel.org/show_bug.cgi?id=200005
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
Common Vulnerability Exposure (CVE) ID: CVE-2018-10881
104901
http://www.securityfocus.com/bid/104901
http://patchwork.ozlabs.org/patch/929792/
https://bugzilla.kernel.org/show_bug.cgi?id=200015
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10881
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e8ab72a812396996035a37e5ca4b3b99b5d214b
Common Vulnerability Exposure (CVE) ID: CVE-2018-10882
https://bugzilla.kernel.org/show_bug.cgi?id=200069
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10882
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c37e9e013469521d9adb932d17a1795c139b36db
Common Vulnerability Exposure (CVE) ID: CVE-2018-10883
USN-3879-1
https://usn.ubuntu.com/3879-1/
USN-3879-2
https://usn.ubuntu.com/3879-2/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10883
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8bc1379b82b8e809eef77a9fedbb75c6c297be19
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e09463f220ca9a1a1ecfda84fcda658f99a1f12a
https://support.f5.com/csp/article/K94735334?utm_source=f5support&amp%3Butm_medium=RSS
Common Vulnerability Exposure (CVE) ID: CVE-2018-1118
USN-3762-1
https://usn.ubuntu.com/3762-1/
USN-3762-2
https://usn.ubuntu.com/3762-2/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
Common Vulnerability Exposure (CVE) ID: CVE-2018-11412
BugTraq ID: 104291
http://www.securityfocus.com/bid/104291
https://www.exploit-db.com/exploits/44832/
https://bugs.chromium.org/p/project-zero/issues/detail?id=1580
https://bugzilla.kernel.org/show_bug.cgi?id=199803
RedHat Security Advisories: RHSA-2019:0525
Common Vulnerability Exposure (CVE) ID: CVE-2018-12904
https://www.exploit-db.com/exploits/44944/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8
https://bugs.chromium.org/p/project-zero/issues/detail?id=1589
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.2
https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8
Common Vulnerability Exposure (CVE) ID: CVE-2018-13405
BugTraq ID: 106503
Debian Security Information: DSA-4266 (Google Search)
https://www.debian.org/security/2018/dsa-4266
https://www.exploit-db.com/exploits/45033/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTKKIAUMR5FAYLZ7HLEPOXMKAAE3BYBQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRBNBX73SAFKQWBOX76SLMWPTKJPVGEJ/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
http://openwall.com/lists/oss-security/2018/07/13/2
https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
https://twitter.com/grsecurity/status/1015082951204327425
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
RedHat Security Advisories: RHSA-2018:2948
RedHat Security Advisories: RHSA-2018:3083
RedHat Security Advisories: RHSA-2018:3096
RedHat Security Advisories: RHSA-2019:0717
https://access.redhat.com/errata/RHSA-2019:0717
RedHat Security Advisories: RHSA-2019:2476
https://access.redhat.com/errata/RHSA-2019:2476
RedHat Security Advisories: RHSA-2019:2566
https://access.redhat.com/errata/RHSA-2019:2566
RedHat Security Advisories: RHSA-2019:2696
https://access.redhat.com/errata/RHSA-2019:2696
RedHat Security Advisories: RHSA-2019:2730
https://access.redhat.com/errata/RHSA-2019:2730
RedHat Security Advisories: RHSA-2019:4159
https://access.redhat.com/errata/RHSA-2019:4159
RedHat Security Advisories: RHSA-2019:4164
https://access.redhat.com/errata/RHSA-2019:4164
Common Vulnerability Exposure (CVE) ID: CVE-2018-14678
BugTraq ID: 104924
http://www.securityfocus.com/bid/104924
Debian Security Information: DSA-4308 (Google Search)
https://www.debian.org/security/2018/dsa-4308
https://xenbits.xen.org/xsa/advisory-274.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
http://www.securitytracker.com/id/1041397
https://usn.ubuntu.com/3931-1/
https://usn.ubuntu.com/3931-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-5390
BugTraq ID: 104976
http://www.securityfocus.com/bid/104976
CERT/CC vulnerability note: VU#962459
https://www.kb.cert.org/vuls/id/962459
Cisco Security Advisory: 20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://security.netapp.com/advisory/ntap-20180815-0003/
https://support.f5.com/csp/article/K95343321
https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS
https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.synology.com/support/security/Synology_SA_18_41
https://www.oracle.com/security-alerts/cpujul2020.html
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
RedHat Security Advisories: RHSA-2018:2384
https://access.redhat.com/errata/RHSA-2018:2384
RedHat Security Advisories: RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2395
RedHat Security Advisories: RHSA-2018:2402
https://access.redhat.com/errata/RHSA-2018:2402
RedHat Security Advisories: RHSA-2018:2403
https://access.redhat.com/errata/RHSA-2018:2403
RedHat Security Advisories: RHSA-2018:2645
https://access.redhat.com/errata/RHSA-2018:2645
RedHat Security Advisories: RHSA-2018:2776
https://access.redhat.com/errata/RHSA-2018:2776
RedHat Security Advisories: RHSA-2018:2785
https://access.redhat.com/errata/RHSA-2018:2785
RedHat Security Advisories: RHSA-2018:2789
https://access.redhat.com/errata/RHSA-2018:2789
RedHat Security Advisories: RHSA-2018:2790
https://access.redhat.com/errata/RHSA-2018:2790
RedHat Security Advisories: RHSA-2018:2791
https://access.redhat.com/errata/RHSA-2018:2791
RedHat Security Advisories: RHSA-2018:2924
https://access.redhat.com/errata/RHSA-2018:2924
RedHat Security Advisories: RHSA-2018:2933
https://access.redhat.com/errata/RHSA-2018:2933
http://www.securitytracker.com/id/1041424
http://www.securitytracker.com/id/1041434
https://usn.ubuntu.com/3732-1/
https://usn.ubuntu.com/3732-2/
https://usn.ubuntu.com/3741-1/
https://usn.ubuntu.com/3741-2/
https://usn.ubuntu.com/3742-1/
https://usn.ubuntu.com/3742-2/
https://usn.ubuntu.com/3763-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-6412
https://marc.info/?l=linux-fbdev&m=151734425901499&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2018-8897
BugTraq ID: 104071
http://www.securityfocus.com/bid/104071
CERT/CC vulnerability note: VU#631579
https://www.kb.cert.org/vuls/id/631579
Debian Security Information: DSA-4201 (Google Search)
https://www.debian.org/security/2018/dsa-4201
https://www.exploit-db.com/exploits/44697/
https://www.exploit-db.com/exploits/45024/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
http://openwall.com/lists/oss-security/2018/05/08/1
http://openwall.com/lists/oss-security/2018/05/08/4
https://bugzilla.redhat.com/show_bug.cgi?id=1567074
https://github.com/can1357/CVE-2018-8897/
https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
https://patchwork.kernel.org/patch/10386677/
https://support.apple.com/HT208742
https://svnweb.freebsd.org/base?view=revision&revision=333368
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc
https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html
https://xenbits.xen.org/xsa/advisory-260.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html
RedHat Security Advisories: RHSA-2018:1319
https://access.redhat.com/errata/RHSA-2018:1319
RedHat Security Advisories: RHSA-2018:1346
https://access.redhat.com/errata/RHSA-2018:1346
RedHat Security Advisories: RHSA-2018:1349
https://access.redhat.com/errata/RHSA-2018:1349
RedHat Security Advisories: RHSA-2018:1350
https://access.redhat.com/errata/RHSA-2018:1350
RedHat Security Advisories: RHSA-2018:1351
https://access.redhat.com/errata/RHSA-2018:1351
RedHat Security Advisories: RHSA-2018:1352
https://access.redhat.com/errata/RHSA-2018:1352
RedHat Security Advisories: RHSA-2018:1353
https://access.redhat.com/errata/RHSA-2018:1353
RedHat Security Advisories: RHSA-2018:1354
https://access.redhat.com/errata/RHSA-2018:1354
http://www.securitytracker.com/id/1040744
http://www.securitytracker.com/id/1040849
http://www.securitytracker.com/id/1040861
http://www.securitytracker.com/id/1040866
http://www.securitytracker.com/id/1040882
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.