Executive Summary
Summary | |
---|---|
Title | linux security update |
Informations | |||
---|---|---|---|
Name | DSA-4308 | First vendor Publication | 2018-10-01 |
Vendor | Debian | Last vendor Modification | 2018-10-01 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.3 | Attack Range | Network |
Cvss Impact Score | 8.5 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2018-6554 A memory leak in the irda_bind function in the irda subsystem was discovered. A local user can take advantage of this flaw to cause a denial of service (memory consumption). CVE-2018-6555 A flaw was discovered in the irda_setsockopt function in the irda subsystem, allowing a local user to cause a denial of service (use-after-free and system crash). CVE-2018-7755 Brian Belleville discovered a flaw in the fd_locked_ioctl function in the floppy driver in the Linux kernel. The floppy driver copies a kernel pointer to user memory in response to the FDGETPRM ioctl. A local user with access to a floppy drive device can take advantage of this flaw to discover the location kernel code and data. CVE-2018-9363 It was discovered that the Bluetooth HIDP implementation did not correctly check the length of received report messages. A paired HIDP device could use this to cause a buffer overflow, leading to denial of service (memory corruption or crash) or potentially remote code execution. CVE-2018-9516 It was discovered that the HID events interface in debugfs did not correctly limit the length of copies to user buffers. A local user with access to these files could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. However, by default debugfs is only accessible by the root user. CVE-2018-10902 It was discovered that the rawmidi kernel driver does not protect against concurrent access which leads to a double-realloc (double free) flaw. A local attacker can take advantage of this issue for privilege escalation. CVE-2018-10938 Yves Younan from Cisco reported that the Cipso IPv4 module did not correctly check the length of IPv4 options. On custom kernels with CONFIG_NETLABEL enabled, a remote attacker could use this to cause a denial of service (hang). CVE-2018-13099 Wen Xu from SSLab at Gatech reported a use-after-free bug in the F2FS implementation. An attacker able to mount a crafted F2FS volume could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2018-14609 Wen Xu from SSLab at Gatech reported a potential null pointer dereference in the F2FS implementation. An attacker able to mount a crafted F2FS volume could use this to cause a denial of service (crash). CVE-2018-14617 Wen Xu from SSLab at Gatech reported a potential null pointer dereference in the HFS+ implementation. An attacker able to mount a crafted HFS+ volume could use this to cause a denial of service (crash). CVE-2018-14633 Vincent Pelletier discovered a stack-based buffer overflow flaw in the chap_server_compute_md5() function in the iSCSI target code. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service or possibly to get a non-authorized access to data exported by an iSCSI target. CVE-2018-14678 M. Vefa Bicakci and Andy Lutomirski discovered a flaw in the kernel exit code used on amd64 systems running as Xen PV guests. A local user could use this to cause a denial of service (crash). CVE-2018-14734 A use-after-free bug was discovered in the InfiniBand communication manager. A local user could use this to cause a denial of service (crash or memory corruption) or possible for privilege escalation. CVE-2018-15572 Esmaiel Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh, from University of California, Riverside, reported a variant of Spectre variant 2, dubbed SpectreRSB. A local user may be able to use this to read sensitive information from processes owned by other users. CVE-2018-15594 Nadav Amit reported that some indirect function calls used in paravirtualised guests were vulnerable to Spectre variant 2. A local user may be able to use this to read sensitive information from the kernel. CVE-2018-16276 Jann Horn discovered that the yurex driver did not correctly limit the length of copies to user buffers. A local user with access to a yurex device node could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. CVE-2018-16658 It was discovered that the cdrom driver does not correctly validate the parameter to the CDROM_DRIVE_STATUS ioctl. A user with access to a cdrom device could use this to read sensitive information from the kernel or to cause a denial of service (crash). CVE-2018-17182 Jann Horn discovered that the vmacache_flush_all function mishandles sequence number overflows. A local user can take advantage of this flaw to trigger a use-after-free, causing a denial of service (crash or memory corruption) or privilege escalation. For the stable distribution (stretch), these problems have been fixed in version 4.9.110-3+deb9u5. We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux |
Original Source
Url : http://www.debian.org/security/2018/dsa-4308 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
25 % | CWE-416 | Use After Free |
19 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
19 % | CWE-200 | Information Exposure |
12 % | CWE-476 | NULL Pointer Dereference |
6 % | CWE-772 | Missing Release of Resource after Effective Lifetime |
6 % | CWE-665 | Improper Initialization |
6 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
6 % | CWE-125 | Out-of-bounds Read |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-e820fccd83.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-cc812838fb.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-ca0e10fc6e.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-59e4747e0f.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-5453baa4af.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-272cf2f9f4.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-0edb45d9db.nasl - Type : ACT_GATHER_INFO |
2018-12-28 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1433.nasl - Type : ACT_GATHER_INFO |
2018-12-28 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1432.nasl - Type : ACT_GATHER_INFO |
2018-12-28 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1407.nasl - Type : ACT_GATHER_INFO |
2018-12-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-3651.nasl - Type : ACT_GATHER_INFO |
2018-12-05 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2018-2_0-0101.nasl - Type : ACT_GATHER_INFO |
2018-11-21 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1382.nasl - Type : ACT_GATHER_INFO |
2018-11-21 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1373.nasl - Type : ACT_GATHER_INFO |
2018-11-21 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1372.nasl - Type : ACT_GATHER_INFO |
2018-11-21 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1370.nasl - Type : ACT_GATHER_INFO |
2018-11-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-3083.nasl - Type : ACT_GATHER_INFO |
2018-10-11 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1086.nasl - Type : ACT_GATHER_INFO |
2018-10-05 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1086.nasl - Type : ACT_GATHER_INFO |
2018-10-04 | Name : The remote Debian host is missing a security update. File : debian_DLA-1531.nasl - Type : ACT_GATHER_INFO |
2018-10-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4308.nasl - Type : ACT_GATHER_INFO |
2018-10-01 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-c0a1284064.nasl - Type : ACT_GATHER_INFO |
2018-09-27 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-d77cc41f35.nasl - Type : ACT_GATHER_INFO |
2018-09-24 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2018-264-01.nasl - Type : ACT_GATHER_INFO |
2018-08-10 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-2f6df9abfb.nasl - Type : ACT_GATHER_INFO |
2018-08-06 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-49bda79bd5.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-11-15 00:21:26 |
|
2018-11-07 12:09:12 |
|
2018-10-01 21:19:13 |
|