![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.704313 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-4313-1) |
Summary: | The remote host is missing an update for the Debian 'linux' package(s) announced via the DSA-4313-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'linux' package(s) announced via the DSA-4313-1 advisory. Vulnerability Insight: Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2018-15471 (XSA-270) Felix Wilhelm of Google Project Zero discovered a flaw in the hash handling of the xen-netback Linux kernel module. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in privilege escalation, denial of service, or information leaks. CVE-2018-18021 It was discovered that the KVM subsystem on the arm64 platform does not properly handle the KVM_SET_ON_REG ioctl. An attacker who can create KVM based virtual machines can take advantage of this flaw for denial of service (hypervisor panic) or privilege escalation (arbitrarily redirect the hypervisor flow of control with full register control). For the stable distribution (stretch), these problems have been fixed in version 4.9.110-3+deb9u6. We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: [link moved to references] Affected Software/OS: 'linux' package(s) on Debian 9. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-15471 Debian Security Information: DSA-4313 (Google Search) https://www.debian.org/security/2018/dsa-4313 http://xenbits.xen.org/xsa/advisory-270.html https://bugs.chromium.org/p/project-zero/issues/detail?id=1607 https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html https://usn.ubuntu.com/3819-1/ https://usn.ubuntu.com/3820-1/ https://usn.ubuntu.com/3820-2/ https://usn.ubuntu.com/3820-3/ Common Vulnerability Exposure (CVE) ID: CVE-2018-18021 BugTraq ID: 105550 http://www.securityfocus.com/bid/105550 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12 https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279 https://github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d https://www.openwall.com/lists/oss-security/2018/10/02/2 RedHat Security Advisories: RHSA-2018:3656 https://access.redhat.com/errata/RHSA-2018:3656 https://usn.ubuntu.com/3821-1/ https://usn.ubuntu.com/3821-2/ https://usn.ubuntu.com/3931-1/ https://usn.ubuntu.com/3931-2/ |
Copyright | Copyright (C) 2018 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |