Description: | Summary: The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-1422-1 advisory.
Vulnerability Insight: Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
This update is not yet available for the armhf (ARM EABI hard-float) architecture.
CVE-2017-5715
Multiple researchers have discovered a vulnerability in various processors supporting speculative execution, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system.
This specific attack has been named Spectre variant 2 (branch target injection) and is mitigated for the x86 architecture (amd64 and i386) by using new microcoded features.
This mitigation requires an update to the processor's microcode, which is non-free. For recent Intel processors, this is included in the intel-microcode package from version 3.20180425.1~ deb8u1. For other processors, it may be included in an update to the system BIOS or UEFI firmware, or in a later update to the amd64-microcode package.
This vulnerability was already mitigated for the x86 architecture by the retpoline feature.
CVE-2017-5753
Further instances of code that was vulnerable to Spectre variant 1 (bounds-check bypass) have been mitigated.
CVE-2018-1066
Dan Aloni reported to Red Hat that the CIFS client implementation would dereference a null pointer if the server sent an invalid response during NTLMSSP setup negotiation. This could be used by a malicious server for denial of service.
The previously applied mitigation for this issue was not appropriate for Linux 3.16 and has been replaced by an alternate fix.
CVE-2018-1093
Wen Xu reported that a crafted ext4 filesystem image could trigger an out-of-bounds read in the ext4_valid_block_bitmap() function. A local user able to mount arbitrary filesystems could use this for denial of service.
CVE-2018-1130
The syzbot software found that the DCCP implementation of sendmsg() does not check the socket state, potentially leading to a null pointer dereference. A local user could use this to cause a denial of service (crash).
CVE-2018-3665
Multiple researchers have discovered that some Intel x86 processors can speculatively read floating-point and vector registers even when access to those registers is disabled. The Linux kernel's lazy FPU feature relies on that access control to avoid saving and restoring those registers for tasks that do not use them, and was enabled by default on x86 processors that do not support the XSAVEOPT instruction.
If lazy FPU is enabled on one of the affected processors, an attacker controlling an unprivileged process may be able to read sensitive information from other users' processes or the kernel. This specifically affects processors based on the Nehalem and Westemere core designs. This issue has been mitigated by disabling lazy FPU by default on all x86 processors that support the FXSAVE ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux' package(s) on Debian 8.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|