Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.891232 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian LTS: Security Advisory for linux (DLA-1232-1) |
Zusammenfassung: | Several vulnerabilities have been discovered in the Linux kernel that;may lead to a privilege escalation, denial of service or information;leaks.;;CVE-2017-5754;;Multiple researchers have discovered a vulnerability in Intel;processors, enabling an attacker controlling an unprivileged;process to read memory from arbitrary addresses, including from;the kernel and all other processes running on the system.;;This specific attack has been named Meltdown and is addressed in;the Linux kernel for the Intel x86-64 architecture by a patch set;named Kernel Page Table Isolation, enforcing a near complete;separation of the kernel and userspace address maps and preventing;the attack. This solution might have a performance impact, and can;be disabled at boot time by passing `pti=off' to the kernel;command line.;;CVE-2017-17558;;Andrey Konovalov reported that USB core did not correctly;handle some error conditions during initialisation. A physically;present user with a specially designed USB device can use this to;cause a denial of service (crash or memory corruption), or;possibly for privilege escalation.;;CVE-2017-17741;;Dmitry Vyukov reported that the KVM implementation for x86 would;over-read data from memory when emulating an MMIO write if the;kvm_mmio tracepoint was enabled. A guest virtual machine might be;able to use this to cause a denial of service (crash).;;CVE-2017-17805;;It was discovered that some implementations of the Salsa20 block;cipher did not correctly handle zero-length input. A local user;could use this to cause a denial of service (crash) or possibly;have other security impact.;;CVE-2017-17806;;It was discovered that the HMAC implementation could be used with;an underlying hash algorithm that requires a key, which was not;intended. A local user could use this to cause a denial of;service (crash or memory corruption), or possibly for privilege;escalation.;;CVE-2017-17807;;Eric Biggers discovered that the KEYS subsystem lacked a check for;write permission when adding keys to a process's default keyring.;A local user could use this to cause a denial of service or to;obtain sensitive information. |
Beschreibung: | Summary: Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2017-5754 Multiple researchers have discovered a vulnerability in Intel processors, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system. This specific attack has been named Meltdown and is addressed in the Linux kernel for the Intel x86-64 architecture by a patch set named Kernel Page Table Isolation, enforcing a near complete separation of the kernel and userspace address maps and preventing the attack. This solution might have a performance impact, and can be disabled at boot time by passing `pti=off' to the kernel command line. CVE-2017-17558 Andrey Konovalov reported that USB core did not correctly handle some error conditions during initialisation. A physically present user with a specially designed USB device can use this to cause a denial of service (crash or memory corruption), or possibly for privilege escalation. CVE-2017-17741 Dmitry Vyukov reported that the KVM implementation for x86 would over-read data from memory when emulating an MMIO write if the kvm_mmio tracepoint was enabled. A guest virtual machine might be able to use this to cause a denial of service (crash). CVE-2017-17805 It was discovered that some implementations of the Salsa20 block cipher did not correctly handle zero-length input. A local user could use this to cause a denial of service (crash) or possibly have other security impact. CVE-2017-17806 It was discovered that the HMAC implementation could be used with an underlying hash algorithm that requires a key, which was not intended. A local user could use this to cause a denial of service (crash or memory corruption), or possibly for privilege escalation. CVE-2017-17807 Eric Biggers discovered that the KEYS subsystem lacked a check for write permission when adding keys to a process's default keyring. A local user could use this to cause a denial of service or to obtain sensitive information. Affected Software/OS: linux on Debian Linux Solution: For Debian 7 'Wheezy', these problems have been fixed in version 3.2.96-3. We recommend that you upgrade your linux packages. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5754 BugTraq ID: 102378 http://www.securityfocus.com/bid/102378 BugTraq ID: 106128 http://www.securityfocus.com/bid/106128 CERT/CC vulnerability note: VU#180049 https://www.kb.cert.org/vuls/id/180049 CERT/CC vulnerability note: VU#584653 http://www.kb.cert.org/vuls/id/584653 Cisco Security Advisory: 20180104 CPU Side-Channel Information Disclosure Vulnerabilities https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel Debian Security Information: DSA-4078 (Google Search) https://www.debian.org/security/2018/dsa-4078 Debian Security Information: DSA-4082 (Google Search) https://www.debian.org/security/2018/dsa-4082 Debian Security Information: DSA-4120 (Google Search) https://www.debian.org/security/2018/dsa-4120 FreeBSD Security Advisory: FreeBSD-SA-18:03 https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc https://security.gentoo.org/glsa/201810-06 https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html https://meltdownattack.com/ https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html RedHat Security Advisories: RHSA-2018:0292 https://access.redhat.com/errata/RHSA-2018:0292 http://www.securitytracker.com/id/1040071 SuSE Security Announcement: SUSE-SU-2018:0010 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html SuSE Security Announcement: SUSE-SU-2018:0012 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html SuSE Security Announcement: openSUSE-SU-2018:0022 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html SuSE Security Announcement: openSUSE-SU-2018:0023 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html https://usn.ubuntu.com/usn/usn-3516-1/ https://usn.ubuntu.com/usn/usn-3522-2/ https://usn.ubuntu.com/3522-3/ https://usn.ubuntu.com/3522-4/ https://usn.ubuntu.com/3523-1/ https://usn.ubuntu.com/usn/usn-3523-2/ https://usn.ubuntu.com/usn/usn-3524-2/ https://usn.ubuntu.com/usn/usn-3525-1/ https://usn.ubuntu.com/3540-2/ https://usn.ubuntu.com/3541-2/ https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3597-1/ https://usn.ubuntu.com/3597-2/ |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |