Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.843255
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu Update for linux-aws USN-3364-3
Zusammenfassung:The remote host is missing an update for the 'linux-aws'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'linux-aws'
package(s) announced via the referenced advisory.

Vulnerability Insight:
It was discovered that the Linux kernel did
not properly initialize a Wake- on-Lan data structure. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2014-9900) It was
discovered that the Linux kernel did not properly restrict access to
/proc/iomem. A local attacker could use this to expose sensitive information.
(CVE-2015-8944) Alexander Potapenko discovered a race condition in the Advanced
Linux Sound Architecture (ALSA) subsystem in the Linux kernel. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2017-1000380) Li Qiang discovered that the DRM driver for VMware Virtual
GPUs in the Linux kernel did not properly validate some ioctl arguments. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2017-7346) Jann Horn discovered that bpf in Linux kernel does not restrict
the output of the print_bpf_insn function. A local attacker could use this to
obtain sensitive address information. (CVE-2017-9150) Murray McAllister
discovered that the DRM driver for VMware Virtual GPUs in the Linux kernel did
not properly initialize memory. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2017-9605)

Affected Software/OS:
linux-aws on Ubuntu 16.04 LTS

Solution:
Please Install the Updated Packages.

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-9900
BugTraq ID: 92222
http://www.securityfocus.com/bid/92222
Common Vulnerability Exposure (CVE) ID: CVE-2015-8944
http://www.openwall.com/lists/kernel-hardening/2016/04/06/22
Common Vulnerability Exposure (CVE) ID: CVE-2017-7346
BugTraq ID: 97257
http://www.securityfocus.com/bid/97257
Debian Security Information: DSA-3927 (Google Search)
http://www.debian.org/security/2017/dsa-3927
Debian Security Information: DSA-3945 (Google Search)
http://www.debian.org/security/2017/dsa-3945
Common Vulnerability Exposure (CVE) ID: CVE-2017-9150
BugTraq ID: 98635
http://www.securityfocus.com/bid/98635
https://www.exploit-db.com/exploits/42048/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0e57697f162da4aa218b5feafe614fb666db07
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.1
https://bugs.chromium.org/p/project-zero/issues/detail?id=1251
https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07
Common Vulnerability Exposure (CVE) ID: CVE-2017-9605
BugTraq ID: 99095
http://www.securityfocus.com/bid/99095
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.