Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.703981
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-3981-1)
Summary:The remote host is missing an update for the Debian 'linux' package(s) announced via the DSA-3981-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux' package(s) announced via the DSA-3981-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the Linux kernel that may lead to privilege escalation, denial of service or information leaks.

CVE-2017-7518

Andy Lutomirski discovered that KVM is prone to an incorrect debug exception (#DB) error occurring while emulating a syscall instruction. A process inside a guest can take advantage of this flaw for privilege escalation inside a guest.

CVE-2017-7558 (stretch only) Stefano Brivio of Red Hat discovered that the SCTP subsystem is prone to a data leak vulnerability due to an out-of-bounds read flaw, allowing to leak up to 100 uninitialized bytes to userspace.

CVE-2017-10661 (jessie only) Dmitry Vyukov of Google reported that the timerfd facility does not properly handle certain concurrent operations on a single file descriptor. This allows a local attacker to cause a denial of service or potentially execute arbitrary code.

CVE-2017-11600

Bo Zhang reported that the xfrm subsystem does not properly validate one of the parameters to a netlink message. Local users with the CAP_NET_ADMIN capability can use this to cause a denial of service or potentially to execute arbitrary code.

CVE-2017-12134 / #866511 / XSA-229 Jan H. Schoenherr of Amazon discovered that when Linux is running in a Xen PV domain on an x86 system, it may incorrectly merge block I/O requests. A buggy or malicious guest may trigger this bug in dom0 or a PV driver domain, causing a denial of service or potentially execution of arbitrary code. This issue can be mitigated by disabling merges on the underlying back-end block devices, e.g.: echo 2 > /sys/block/nvme0n1/queue/nomerges

CVE-2017-12146 (stretch only) Adrian Salido of Google reported a race condition in access to the driver_override attribute for platform devices in sysfs. If unprivileged users are permitted to access this attribute, this might allow them to gain privileges.

CVE-2017-12153

Bo Zhang reported that the cfg80211 (wifi) subsystem does not properly validate the parameters to a netlink message. Local users with the CAP_NET_ADMIN capability (in any user namespace with a wifi device) can use this to cause a denial of service.

CVE-2017-12154

Jim Mattson of Google reported that the KVM implementation for Intel x86 processors did not correctly handle certain nested hypervisor configurations. A malicious guest (or nested guest in a suitable L1 hypervisor) could use this for denial of service.

CVE-2017-14106

Andrey Konovalov discovered that a user-triggerable division by zero in the tcp_disconnect() function could result in local denial of service.

CVE-2017-14140

Otto Ebeling reported that the move_pages() system call performed insufficient validation of the UIDs of the calling and target processes, resulting in a partial ASLR bypass. This made it easier for local users to exploit vulnerabilities in programs installed with the set-UID permission bit set.

CVE-2017-14156

sohu0106 ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux' package(s) on Debian 8, Debian 9.

Solution:
Please install the updated package(s).

CVSS Score:
7.7

CVSS Vector:
AV:A/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000111
BugTraq ID: 100267
http://www.securityfocus.com/bid/100267
Debian Security Information: DSA-3981 (Google Search)
http://www.debian.org/security/2017/dsa-3981
RedHat Security Advisories: RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2918
RedHat Security Advisories: RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2930
RedHat Security Advisories: RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:2931
RedHat Security Advisories: RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2017:3200
http://www.securitytracker.com/id/1039132
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000112
BugTraq ID: 100262
http://www.securityfocus.com/bid/100262
https://www.exploit-db.com/exploits/45147/
https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
http://seclists.org/oss-sec/2017/q3/277
RedHat Security Advisories: RHSA-2019:1931
https://access.redhat.com/errata/RHSA-2019:1931
RedHat Security Advisories: RHSA-2019:1932
https://access.redhat.com/errata/RHSA-2019:1932
RedHat Security Advisories: RHSA-2019:4159
https://access.redhat.com/errata/RHSA-2019:4159
http://www.securitytracker.com/id/1039162
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000251
BugTraq ID: 100809
http://www.securityfocus.com/bid/100809
CERT/CC vulnerability note: VU#240311
https://www.kb.cert.org/vuls/id/240311
https://www.exploit-db.com/exploits/42762/
https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
https://www.armis.com/blueborne
RedHat Security Advisories: RHSA-2017:2679
https://access.redhat.com/errata/RHSA-2017:2679
RedHat Security Advisories: RHSA-2017:2680
https://access.redhat.com/errata/RHSA-2017:2680
RedHat Security Advisories: RHSA-2017:2681
https://access.redhat.com/errata/RHSA-2017:2681
RedHat Security Advisories: RHSA-2017:2682
https://access.redhat.com/errata/RHSA-2017:2682
RedHat Security Advisories: RHSA-2017:2683
https://access.redhat.com/errata/RHSA-2017:2683
RedHat Security Advisories: RHSA-2017:2704
https://access.redhat.com/errata/RHSA-2017:2704
RedHat Security Advisories: RHSA-2017:2705
https://access.redhat.com/errata/RHSA-2017:2705
RedHat Security Advisories: RHSA-2017:2706
https://access.redhat.com/errata/RHSA-2017:2706
RedHat Security Advisories: RHSA-2017:2707
https://access.redhat.com/errata/RHSA-2017:2707
RedHat Security Advisories: RHSA-2017:2731
https://access.redhat.com/errata/RHSA-2017:2731
RedHat Security Advisories: RHSA-2017:2732
https://access.redhat.com/errata/RHSA-2017:2732
http://www.securitytracker.com/id/1039373
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000370
BugTraq ID: 99149
http://www.securityfocus.com/bid/99149
https://www.exploit-db.com/exploits/42273/
https://www.exploit-db.com/exploits/42274/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000371
BugTraq ID: 99131
http://www.securityfocus.com/bid/99131
https://www.exploit-db.com/exploits/42276/
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000380
BugTraq ID: 99121
http://www.securityfocus.com/bid/99121
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
http://www.openwall.com/lists/oss-security/2017/06/12/2
https://github.com/torvalds/linux/commit/ba3021b2c79b2fa9114f92790a99deb27a65b728
https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378
RedHat Security Advisories: RHSA-2017:3295
https://access.redhat.com/errata/RHSA-2017:3295
RedHat Security Advisories: RHSA-2017:3315
https://access.redhat.com/errata/RHSA-2017:3315
RedHat Security Advisories: RHSA-2017:3322
https://access.redhat.com/errata/RHSA-2017:3322
Common Vulnerability Exposure (CVE) ID: CVE-2017-11600
BugTraq ID: 99928
http://www.securityfocus.com/bid/99928
http://seclists.org/bugtraq/2017/Jul/30
RedHat Security Advisories: RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:1965
RedHat Security Advisories: RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2018:2003
RedHat Security Advisories: RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1170
RedHat Security Advisories: RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:1190
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-12134
BugTraq ID: 100343
http://www.securityfocus.com/bid/100343
https://security.gentoo.org/glsa/201801-14
https://bugzilla.redhat.com/show_bug.cgi?id=1477656
http://www.openwall.com/lists/oss-security/2017/08/15/4
http://www.securitytracker.com/id/1039176
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-12153
100855
http://www.securityfocus.com/bid/100855
DSA-3981
USN-3583-1
https://usn.ubuntu.com/3583-1/
USN-3583-2
https://usn.ubuntu.com/3583-2/
http://seclists.org/oss-sec/2017/q3/437
https://bugzilla.novell.com/show_bug.cgi?id=1058410
https://bugzilla.redhat.com/show_bug.cgi?id=1491046
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
https://marc.info/?t=150525503100001&r=1&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2017-12154
100856
http://www.securityfocus.com/bid/100856
RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:0676
RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1062
RHSA-2019:1946
https://access.redhat.com/errata/RHSA-2019:1946
USN-3698-1
https://usn.ubuntu.com/3698-1/
USN-3698-2
https://usn.ubuntu.com/3698-2/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
https://bugzilla.redhat.com/show_bug.cgi?id=1491224
https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
https://www.spinics.net/lists/kvm/msg155414.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-14106
BugTraq ID: 100878
http://www.securityfocus.com/bid/100878
RedHat Security Advisories: RHSA-2018:2172
https://access.redhat.com/errata/RHSA-2018:2172
http://www.securitytracker.com/id/1039549
Common Vulnerability Exposure (CVE) ID: CVE-2017-14140
BugTraq ID: 100876
http://www.securityfocus.com/bid/100876
RedHat Security Advisories: RHSA-2018:0676
RedHat Security Advisories: RHSA-2018:1062
Common Vulnerability Exposure (CVE) ID: CVE-2017-14156
BugTraq ID: 100634
http://www.securityfocus.com/bid/100634
https://github.com/torvalds/linux/pull/441
https://marc.info/?l=linux-kernel&m=150401461613306&w=2
https://marc.info/?l=linux-kernel&m=150453196710422&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2017-14340
BugTraq ID: 100851
http://www.securityfocus.com/bid/100851
Common Vulnerability Exposure (CVE) ID: CVE-2017-14489
BugTraq ID: 101011
http://www.securityfocus.com/bid/101011
https://www.exploit-db.com/exploits/42932/
Common Vulnerability Exposure (CVE) ID: CVE-2017-7518
BugTraq ID: 99263
http://www.securityfocus.com/bid/99263
https://www.debian.org/security/2017/dsa-3981
https://www.spinics.net/lists/kvm/msg151817.html
http://www.openwall.com/lists/oss-security/2017/06/23/5
RedHat Security Advisories: RHSA-2018:0395
https://access.redhat.com/errata/RHSA-2018:0395
RedHat Security Advisories: RHSA-2018:0412
https://access.redhat.com/errata/RHSA-2018:0412
http://www.securitytracker.com/id/1038782
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.