Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891099
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-1099-1)
Summary:The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-1099-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-1099-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

CVE-2017-7482

Shi Lei discovered that RxRPC Kerberos 5 ticket handling code does not properly verify metadata, leading to information disclosure, denial of service or potentially execution of arbitrary code.

CVE-2017-7542

An integer overflow vulnerability in the ip6_find_1stfragopt() function was found allowing a local attacker with privileges to open raw sockets to cause a denial of service.

CVE-2017-7889

Tommi Rantala and Brad Spengler reported that the mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, allowing a local attacker with access to /dev/mem to obtain sensitive information or potentially execute arbitrary code.

CVE-2017-10661

Dmitry Vyukov of Google reported that the timerfd facility does not properly handle certain concurrent operations on a single file descriptor. This allows a local attacker to cause a denial of service or potentially to execute arbitrary code.

CVE-2017-10911 / XSA-216 Anthony Perard of Citrix discovered an information leak flaw in Xen blkif response handling, allowing a malicious unprivileged guest to obtain sensitive information from the host or other guests.

CVE-2017-11176

It was discovered that the mq_notify() function does not set the sock pointer to NULL upon entry into the retry logic. An attacker can take advantage of this flaw during a userspace close of a Netlink socket to cause a denial of service or potentially cause other impact.

CVE-2017-11600

bo Zhang reported that the xfrm subsystem does not properly validate one of the parameters to a netlink message. Local users with the CAP_NET_ADMIN capability can use this to cause a denial of service or potentially to execute arbitrary code.

CVE-2017-12134 / #866511 / XSA-229 Jan H. Schonherr of Amazon discovered that when Linux is running in a Xen PV domain on an x86 system, it may incorrectly merge block I/O requests. A buggy or malicious guest may trigger this bug in dom0 or a PV driver domain, causing a denial of service or potentially execution of arbitrary code. This issue can be mitigated by disabling merges on the underlying back-end block devices, e.g.: echo 2 > /sys/block/nvme0n1/queue/nomerges

CVE-2017-12153

bo Zhang reported that the cfg80211 (wifi) subsystem does not properly validate the parameters to a netlink message. Local users with the CAP_NET_ADMIN capability on a system with a wifi device can use this to cause a denial of service.

CVE-2017-12154

Jim Mattson of Google reported that the KVM implementation for Intel x86 processors did not correctly handle certain nested hypervisor configurations. A malicious guest (or nested guest in a suitable L1 hypervisor) could use this for denial of service.

CVE-2017-14106

Andrey Konovalov of Google reported that a specific ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux' package(s) on Debian 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.7

CVSS Vector:
AV:A/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000111
BugTraq ID: 100267
http://www.securityfocus.com/bid/100267
Debian Security Information: DSA-3981 (Google Search)
http://www.debian.org/security/2017/dsa-3981
RedHat Security Advisories: RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2918
RedHat Security Advisories: RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2930
RedHat Security Advisories: RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:2931
RedHat Security Advisories: RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2017:3200
http://www.securitytracker.com/id/1039132
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000251
BugTraq ID: 100809
http://www.securityfocus.com/bid/100809
CERT/CC vulnerability note: VU#240311
https://www.kb.cert.org/vuls/id/240311
https://www.exploit-db.com/exploits/42762/
https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
https://www.armis.com/blueborne
RedHat Security Advisories: RHSA-2017:2679
https://access.redhat.com/errata/RHSA-2017:2679
RedHat Security Advisories: RHSA-2017:2680
https://access.redhat.com/errata/RHSA-2017:2680
RedHat Security Advisories: RHSA-2017:2681
https://access.redhat.com/errata/RHSA-2017:2681
RedHat Security Advisories: RHSA-2017:2682
https://access.redhat.com/errata/RHSA-2017:2682
RedHat Security Advisories: RHSA-2017:2683
https://access.redhat.com/errata/RHSA-2017:2683
RedHat Security Advisories: RHSA-2017:2704
https://access.redhat.com/errata/RHSA-2017:2704
RedHat Security Advisories: RHSA-2017:2705
https://access.redhat.com/errata/RHSA-2017:2705
RedHat Security Advisories: RHSA-2017:2706
https://access.redhat.com/errata/RHSA-2017:2706
RedHat Security Advisories: RHSA-2017:2707
https://access.redhat.com/errata/RHSA-2017:2707
RedHat Security Advisories: RHSA-2017:2731
https://access.redhat.com/errata/RHSA-2017:2731
RedHat Security Advisories: RHSA-2017:2732
https://access.redhat.com/errata/RHSA-2017:2732
http://www.securitytracker.com/id/1039373
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000363
BugTraq ID: 98651
http://www.securityfocus.com/bid/98651
Debian Security Information: DSA-3945 (Google Search)
http://www.debian.org/security/2017/dsa-3945
https://alephsecurity.com/vulns/aleph-2017023
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000365
BugTraq ID: 99156
http://www.securityfocus.com/bid/99156
Debian Security Information: DSA-3927 (Google Search)
http://www.debian.org/security/2017/dsa-3927
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000380
BugTraq ID: 99121
http://www.securityfocus.com/bid/99121
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
http://www.openwall.com/lists/oss-security/2017/06/12/2
https://github.com/torvalds/linux/commit/ba3021b2c79b2fa9114f92790a99deb27a65b728
https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378
RedHat Security Advisories: RHSA-2017:3295
https://access.redhat.com/errata/RHSA-2017:3295
RedHat Security Advisories: RHSA-2017:3315
https://access.redhat.com/errata/RHSA-2017:3315
RedHat Security Advisories: RHSA-2017:3322
https://access.redhat.com/errata/RHSA-2017:3322
Common Vulnerability Exposure (CVE) ID: CVE-2017-10661
BugTraq ID: 100215
http://www.securityfocus.com/bid/100215
https://www.exploit-db.com/exploits/43345/
RedHat Security Advisories: RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3083
RedHat Security Advisories: RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3096
RedHat Security Advisories: RHSA-2019:4057
https://access.redhat.com/errata/RHSA-2019:4057
RedHat Security Advisories: RHSA-2019:4058
https://access.redhat.com/errata/RHSA-2019:4058
RedHat Security Advisories: RHSA-2020:0036
https://access.redhat.com/errata/RHSA-2020:0036
Common Vulnerability Exposure (CVE) ID: CVE-2017-10911
BugTraq ID: 99162
http://www.securityfocus.com/bid/99162
Debian Security Information: DSA-3920 (Google Search)
http://www.debian.org/security/2017/dsa-3920
https://security.gentoo.org/glsa/201708-03
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
http://www.securitytracker.com/id/1038720
Common Vulnerability Exposure (CVE) ID: CVE-2017-11176
BugTraq ID: 99919
http://www.securityfocus.com/bid/99919
https://www.exploit-db.com/exploits/45553/
RedHat Security Advisories: RHSA-2018:0169
https://access.redhat.com/errata/RHSA-2018:0169
RedHat Security Advisories: RHSA-2018:3822
https://access.redhat.com/errata/RHSA-2018:3822
Common Vulnerability Exposure (CVE) ID: CVE-2017-11600
BugTraq ID: 99928
http://www.securityfocus.com/bid/99928
http://seclists.org/bugtraq/2017/Jul/30
RedHat Security Advisories: RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:1965
RedHat Security Advisories: RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2018:2003
RedHat Security Advisories: RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1170
RedHat Security Advisories: RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:1190
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-12134
BugTraq ID: 100343
http://www.securityfocus.com/bid/100343
https://security.gentoo.org/glsa/201801-14
https://bugzilla.redhat.com/show_bug.cgi?id=1477656
http://www.openwall.com/lists/oss-security/2017/08/15/4
http://www.securitytracker.com/id/1039176
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-12153
100855
http://www.securityfocus.com/bid/100855
DSA-3981
USN-3583-1
https://usn.ubuntu.com/3583-1/
USN-3583-2
https://usn.ubuntu.com/3583-2/
http://seclists.org/oss-sec/2017/q3/437
https://bugzilla.novell.com/show_bug.cgi?id=1058410
https://bugzilla.redhat.com/show_bug.cgi?id=1491046
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
https://marc.info/?t=150525503100001&r=1&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2017-12154
100856
http://www.securityfocus.com/bid/100856
RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:0676
RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1062
RHSA-2019:1946
https://access.redhat.com/errata/RHSA-2019:1946
USN-3698-1
https://usn.ubuntu.com/3698-1/
USN-3698-2
https://usn.ubuntu.com/3698-2/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
https://bugzilla.redhat.com/show_bug.cgi?id=1491224
https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
https://www.spinics.net/lists/kvm/msg155414.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-14106
BugTraq ID: 100878
http://www.securityfocus.com/bid/100878
RedHat Security Advisories: RHSA-2018:2172
https://access.redhat.com/errata/RHSA-2018:2172
http://www.securitytracker.com/id/1039549
Common Vulnerability Exposure (CVE) ID: CVE-2017-14140
BugTraq ID: 100876
http://www.securityfocus.com/bid/100876
RedHat Security Advisories: RHSA-2018:0676
RedHat Security Advisories: RHSA-2018:1062
Common Vulnerability Exposure (CVE) ID: CVE-2017-14156
BugTraq ID: 100634
http://www.securityfocus.com/bid/100634
https://github.com/torvalds/linux/pull/441
https://marc.info/?l=linux-kernel&m=150401461613306&w=2
https://marc.info/?l=linux-kernel&m=150453196710422&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2017-14340
BugTraq ID: 100851
http://www.securityfocus.com/bid/100851
Common Vulnerability Exposure (CVE) ID: CVE-2017-14489
BugTraq ID: 101011
http://www.securityfocus.com/bid/101011
https://www.exploit-db.com/exploits/42932/
Common Vulnerability Exposure (CVE) ID: CVE-2017-7482
BugTraq ID: 99299
http://www.securityfocus.com/bid/99299
https://www.debian.org/security/2017/dsa-3927
https://www.debian.org/security/2017/dsa-3945
http://seclists.org/oss-sec/2017/q2/602
RedHat Security Advisories: RHSA-2019:0641
https://access.redhat.com/errata/RHSA-2019:0641
http://www.securitytracker.com/id/1038787
Common Vulnerability Exposure (CVE) ID: CVE-2017-7542
99953
http://www.securityfocus.com/bid/99953
DSA-3927
DSA-3945
RHSA-2017:2918
RHSA-2017:2930
RHSA-2017:2931
RHSA-2018:0169
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6399f1fae4ec29fab5ec76070435555e256ca3a6
https://github.com/torvalds/linux/commit/6399f1fae4ec29fab5ec76070435555e256ca3a6
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Common Vulnerability Exposure (CVE) ID: CVE-2017-7889
BugTraq ID: 97690
http://www.securityfocus.com/bid/97690
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94
http://www.openwall.com/lists/oss-security/2017/04/16/4
https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94
RedHat Security Advisories: RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2077
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
RedHat Security Advisories: RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1854
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.