Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2017.0467
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2017-0467)
Summary:The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2017-0467 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2017-0467 advisory.

Vulnerability Insight:
This kernel-linus update is based on upstream 4.4.105 and fixes at least the
following security issues:

A security flaw was discovered in nl80211_set_rekey_data() function in the
Linux kernel since v3.1-rc1 through v4.13. This function does not check
whether the required attributes are present in a netlink request. This
request can be issued by a user with CAP_NET_ADMIN privilege and may result
in NULL dereference and a system crash (CVE-2017-12153).

Linux kernel built with the KVM visualization support (CONFIG_KVM), with
nested visualization (nVMX) feature enabled (nested=1), is vulnerable to a
crash due to disabled external interrupts. As L2 guest could acce s (r/w)
hardware CR8 register of the host(L0). In a nested visualization setup,
L2 guest user could use this flaw to potentially crash the host(L0)
resulting in DoS (CVE-2017-12154).

The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before
4.12 allows local users to cause a denial of service (__tcp_select_window
divide-by-zero error and system crash) by triggering a disconnect within a
certain tcp_recvmsg code path (CVE-2017-14106).

The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the
Linux kernel through 4.12.10 does not initialize a certain data structure,
which allows local users to obtain sensitive information from kernel stack
memory by reading locations associated with padding bytes (CVE-2017-14156).

It was found that the iscsi_if_rx() function in scsi_transport_iscsi.c in
the Linux kernel since v2.6.24-rc1 through 4.13.2 allows local users to
cause a denial of service (a system panic) by making a number of certain
syscalls by leveraging incorrect length validation in the kernel code
(CVE-2017-14489).

The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4
allows local users to obtain sensitive information from uninitialized kernel
heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0
(CVE-2017-14991).

A reachable assertion failure flaw was found in the Linux kernel built with
KVM virtualisation(CONFIG_KVM) support with Virtual Function I/O feature
(CONFIG_VFIO) enabled. This failure could occur if a malicious guest device
sent a virtual interrupt (guest IRQ) with a larger (>1024) index value
(CVE-2017-1000252).

For other upstream fixes in this update, read the referenced changelogs.

Affected Software/OS:
'kernel-linus' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-0786
BugTraq ID: 100655
http://www.securityfocus.com/bid/100655
Common Vulnerability Exposure (CVE) ID: CVE-2017-12190
101911
http://www.securityfocus.com/bid/101911
RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0654
RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:0676
RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1062
RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1854
RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1170
RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:1190
USN-3582-1
https://usn.ubuntu.com/3582-1/
USN-3582-2
https://usn.ubuntu.com/3582-2/
USN-3583-1
https://usn.ubuntu.com/3583-1/
USN-3583-2
https://usn.ubuntu.com/3583-2/
[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467
http://seclists.org/oss-sec/2017/q4/52
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
https://bugzilla.redhat.com/show_bug.cgi?id=1495089
https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467
https://support.f5.com/csp/article/K93472064?utm_source=f5support&amp%3Butm_medium=RSS
Common Vulnerability Exposure (CVE) ID: CVE-2017-12193
101678
http://www.securityfocus.com/bid/101678
RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0151
USN-3698-1
https://usn.ubuntu.com/3698-1/
USN-3698-2
https://usn.ubuntu.com/3698-2/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
https://bugzilla.redhat.com/show_bug.cgi?id=1501215
https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
Common Vulnerability Exposure (CVE) ID: CVE-2017-13080
BugTraq ID: 101274
http://www.securityfocus.com/bid/101274
CERT/CC vulnerability note: VU#228519
http://www.kb.cert.org/vuls/id/228519
Cisco Security Advisory: 20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
Debian Security Information: DSA-3999 (Google Search)
http://www.debian.org/security/2017/dsa-3999
FreeBSD Security Advisory: FreeBSD-SA-17:07
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
https://security.gentoo.org/glsa/201711-03
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
https://www.krackattacks.com/
https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
RedHat Security Advisories: RHSA-2017:2907
https://access.redhat.com/errata/RHSA-2017:2907
RedHat Security Advisories: RHSA-2017:2911
https://access.redhat.com/errata/RHSA-2017:2911
http://www.securitytracker.com/id/1039572
http://www.securitytracker.com/id/1039573
http://www.securitytracker.com/id/1039576
http://www.securitytracker.com/id/1039577
http://www.securitytracker.com/id/1039578
http://www.securitytracker.com/id/1039581
http://www.securitytracker.com/id/1039585
http://www.securitytracker.com/id/1039703
SuSE Security Announcement: SUSE-SU-2017:2745 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
SuSE Security Announcement: SUSE-SU-2017:2752 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
SuSE Security Announcement: openSUSE-SU-2017:2755 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
http://www.ubuntu.com/usn/USN-3455-1
Common Vulnerability Exposure (CVE) ID: CVE-2017-15115
101877
http://www.securityfocus.com/bid/101877
SUSE-SU-2018:0011
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
USN-3581-1
https://usn.ubuntu.com/3581-1/
USN-3581-2
https://usn.ubuntu.com/3581-2/
USN-3581-3
https://usn.ubuntu.com/3581-3/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
http://seclists.org/oss-sec/2017/q4/282
https://bugzilla.redhat.com/show_bug.cgi?id=1513345
https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
https://patchwork.ozlabs.org/patch/827077/
https://source.android.com/security/bulletin/pixel/2018-04-01
Common Vulnerability Exposure (CVE) ID: CVE-2017-15265
BugTraq ID: 101288
http://www.securityfocus.com/bid/101288
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
https://bugzilla.suse.com/show_bug.cgi?id=1062520
https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://source.android.com/security/bulletin/2018-02-01
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
http://www.openwall.com/lists/oss-security/2017/10/11/3
RedHat Security Advisories: RHSA-2018:0676
RedHat Security Advisories: RHSA-2018:1062
RedHat Security Advisories: RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1130
RedHat Security Advisories: RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:1170
RedHat Security Advisories: RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2390
RedHat Security Advisories: RHSA-2018:3822
https://access.redhat.com/errata/RHSA-2018:3822
RedHat Security Advisories: RHSA-2018:3823
https://access.redhat.com/errata/RHSA-2018:3823
http://www.securitytracker.com/id/1039561
Common Vulnerability Exposure (CVE) ID: CVE-2017-15299
https://bugzilla.redhat.com/show_bug.cgi?id=1498016
https://marc.info/?t=150654188100001&r=1&w=2
https://marc.info/?t=150783958600011&r=1&w=2
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1499828.html
RedHat Security Advisories: RHSA-2018:0654
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16939
BugTraq ID: 101954
http://www.securityfocus.com/bid/101954
Debian Security Information: DSA-4082 (Google Search)
https://www.debian.org/security/2018/dsa-4082
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1137b5e2529a8f5ca8ee709288ecba3e68044df2
http://seclists.org/fulldisclosure/2017/Nov/40
https://blogs.securiteam.com/index.php/archives/3535
https://bugzilla.suse.com/show_bug.cgi?id=1069702
https://github.com/torvalds/linux/commit/1137b5e2529a8f5ca8ee709288ecba3e68044df2
RedHat Security Advisories: RHSA-2018:1318
https://access.redhat.com/errata/RHSA-2018:1318
RedHat Security Advisories: RHSA-2018:1355
https://access.redhat.com/errata/RHSA-2018:1355
RedHat Security Advisories: RHSA-2019:1170
RedHat Security Advisories: RHSA-2019:1190
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2017-16994
BugTraq ID: 101969
http://www.securityfocus.com/bid/101969
https://www.exploit-db.com/exploits/43178/
RedHat Security Advisories: RHSA-2018:0502
https://access.redhat.com/errata/RHSA-2018:0502
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-7518
BugTraq ID: 99263
http://www.securityfocus.com/bid/99263
Debian Security Information: DSA-3981 (Google Search)
https://www.debian.org/security/2017/dsa-3981
https://www.spinics.net/lists/kvm/msg151817.html
http://www.openwall.com/lists/oss-security/2017/06/23/5
RedHat Security Advisories: RHSA-2018:0395
https://access.redhat.com/errata/RHSA-2018:0395
RedHat Security Advisories: RHSA-2018:0412
https://access.redhat.com/errata/RHSA-2018:0412
http://www.securitytracker.com/id/1038782
https://usn.ubuntu.com/3754-1/
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.