Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:251963
[Rus]
Version
1
Class
patch
ALTXid
482735
Language
English
Severity
High
Title
PHSA-2019-0122 -- Photon OS Security Update for linux-aws
Description
Updates of linux-aws packages of Photon OS have been released.
Family
unix
Platform
VMware Photon OS 2.0
Product
linux-aws
Reference
VENDOR: PHSA-2019-0122
VENDOR: PHSA-2019-0122
Id:
PHSA-2019-0122
Reference:
https://github.com/vmware/photon/wiki/Security-Update-2.0-122
CVE: CVE-2018-14634
CVE: CVE-2018-14634
Id:
CVE-2018-14634
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14634
Comment
: An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
190 (Integer Overflow or Wraparound)
References:
[oss-security] 20180925 Integer overflow in Linux's create_elf_tables() (CVE-2018-14634) (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634 (CONFIRM)
RHSA-2018:2763 (REDHAT)
RHSA-2018:2748 (REDHAT)
105407 (BID)
45516 (EXPLOIT-DB)
USN-3775-2 (UBUNTU)
USN-3779-1 (UBUNTU)
USN-3775-1 (UBUNTU)
RHSA-2018:2846 (REDHAT)
RHSA-2018:2933 (REDHAT)
RHSA-2018:2925 (REDHAT)
RHSA-2018:2924 (REDHAT)
RHSA-2018:3591 (REDHAT)
RHSA-2018:3590 (REDHAT)
RHSA-2018:3586 (REDHAT)
RHSA-2018:3540 (REDHAT)
RHSA-2018:3643 (REDHAT)
https://security.netapp.com/advisory/ntap-20190204-0002/ (CONFIRM)
https://security.paloaltonetworks.com/CVE-2018-14634 (CONFIRM)
[oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1) (MLIST)
https://support.f5.com/csp/article/K20934447?utm_source=f5support&%3Butm_medium=RSS (MISC)
CVE: CVE-2018-10675
CVE: CVE-2018-10675
Id:
CVE-2018-10675
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10675
Comment
: The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9 (MISC)
https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 (MISC)
104093 (BID)
RHSA-2018:2164 (REDHAT)
RHSA-2018:2395 (REDHAT)
RHSA-2018:2384 (REDHAT)
USN-3754-1 (UBUNTU)
RHSA-2018:2791 (REDHAT)
RHSA-2018:2785 (REDHAT)
RHSA-2018:2933 (REDHAT)
RHSA-2018:2925 (REDHAT)
RHSA-2018:2924 (REDHAT)
RHSA-2018:3590 (REDHAT)
RHSA-2018:3586 (REDHAT)
RHSA-2018:3540 (REDHAT)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 (CONFIRM)
https://www.oracle.com/security-alerts/cpujul2020.html (MISC)
CVE: CVE-2017-18270
CVE: CVE-2017-18270
Id:
CVE-2017-18270
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18270
Comment
: In the Linux kernel before 4.13.5, a local user could create keyrings for other users via keyctl commands, setting unwanted defaults or causing a denial of service.
CVSSv2 Score:
3.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:P
CVSSv3 Score:
7.1
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
References:
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.5 (CONFIRM)
https://github.com/torvalds/linux/commit/237bbd29f7a049d310d907f4b2716a7feef9abf3 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=237bbd29f7a049d310d907f4b2716a7feef9abf3 (CONFIRM)
104254 (BID)
USN-3754-1 (UBUNTU)
https://bugzilla.redhat.com/show_bug.cgi?id=1856774#c11 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=1856774#c9 (MISC)
https://support.f5.com/csp/article/K37301725 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1580979 (MISC)
CVE: CVE-2018-1068
CVE: CVE-2018-1068
Id:
CVE-2018-1068
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
Comment
: A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
6.7
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
HIGH
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE:
787 (Out-of-bounds Write)
References:
https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6 (CONFIRM)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1552048 (CONFIRM)
[linux-netdev] 20180305 [PATCH net] netfilter: check for out-of-bounds while copying compat entries (MLIST)
[linux-netdev] 20180305 BUG: unable to handle kernel paging request in compat_copy_entries (MLIST)
103459 (BID)
DSA-4188 (DEBIAN)
DSA-4187 (DEBIAN)
[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update (MLIST)
RHSA-2018:1355 (REDHAT)
RHSA-2018:1318 (REDHAT)
USN-3654-2 (UBUNTU)
USN-3654-1 (UBUNTU)
USN-3656-1 (UBUNTU)
USN-3677-2 (UBUNTU)
USN-3677-1 (UBUNTU)
USN-3674-2 (UBUNTU)
USN-3674-1 (UBUNTU)
RHSA-2018:2948 (REDHAT)
RHSA-2019:1170 (REDHAT)
RHSA-2019:1190 (REDHAT)
RHSA-2019:4159 (REDHAT)
CVE: CVE-2018-1065
CVE: CVE-2018-1065
Id:
CVE-2018-1065
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
Comment
: The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=1547824 (MISC)
http://patchwork.ozlabs.org/patch/870355/ (MISC)
http://lists.openwall.net/netdev/2018/01/27/46 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 (MISC)
1040446 (SECTRACK)
DSA-4188 (DEBIAN)
USN-3654-2 (UBUNTU)
USN-3654-1 (UBUNTU)
USN-3656-1 (UBUNTU)
RHSA-2018:2948 (REDHAT)
CVE: CVE-2016-9604
CVE: CVE-2016-9604
Id:
CVE-2016-9604
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604
Comment
: It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
4.4
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
HIGH
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
CWE:
347 (Improper Verification of Cryptographic Signature)
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9604 (CONFIRM)
https://bugzilla.novell.com/show_bug.cgi?id=1035576 (CONFIRM)
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9604.html (CONFIRM)
RHSA-2017:2669 (REDHAT)
RHSA-2017:2077 (REDHAT)
RHSA-2017:1842 (REDHAT)
102135 (BID)
CVE: CVE-2017-18344
CVE: CVE-2017-18344
Id:
CVE-2017-18344
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344
Comment
: The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8 (MISC)
104909 (BID)
1041414 (SECTRACK)
45175 (EXPLOIT-DB)
USN-3742-2 (UBUNTU)
USN-3742-1 (UBUNTU)
RHSA-2018:3096 (REDHAT)
RHSA-2018:3083 (REDHAT)
RHSA-2018:2948 (REDHAT)
RHSA-2018:3459 (REDHAT)
RHSA-2018:3591 (REDHAT)
RHSA-2018:3590 (REDHAT)
RHSA-2018:3586 (REDHAT)
RHSA-2018:3540 (REDHAT)
CVE: CVE-2018-7191
CVE: CVE-2018-7191
Id:
CVE-2018-7191
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191
Comment
: In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9 (MISC)
https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c25f65fd1e42685f7ccd80e0621829c105785d9 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ad646c81b2182f7fa67ec0c8c825e0ee165696d (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.14 (MISC)
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1748846 (MISC)
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1743792 (MISC)
108380 (BID)
openSUSE-SU-2019:1479 (SUSE)
openSUSE-SU-2019:1570 (SUSE)
openSUSE-SU-2019:1579 (SUSE)
CVE: CVE-2015-5327
CVE: CVE-2015-5327
Id:
CVE-2015-5327
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5327
Comment
: Out-of-bounds memory read in the x509_decode_time function in x509_cert_parser.c in Linux kernels 4.3-rc1 and after.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:P/I:N/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
125 (Out-of-bounds Read)
References:
[oss-security] 20151127 CVE-2015-5327 kernel: User triggerable out-of-bounds read (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=1278978 (CONFIRM)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206 (CONFIRM)
CVE: CVE-2017-18360
CVE: CVE-2017-18360
Id:
CVE-2017-18360
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18360
Comment
: In change_port_settings in drivers/usb/serial/io_ti.c in the Linux kernel before 4.11.3, local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
369 (Divide By Zero)
References:
https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3 (MISC)
https://bugzilla.suse.com/show_bug.cgi?id=1123706 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b (MISC)
106802 (BID)
USN-3933-2 (UBUNTU)
USN-3933-1 (UBUNTU)
CVE: CVE-2017-18193
CVE: CVE-2017-18193
Id:
CVE-2017-18193
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
Comment
: fs/f2fs/extent_cache.c in the Linux kernel before 4.13 mishandles extent trees, which allows local users to cause a denial of service (BUG) via an application with multiple threads.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://github.com/torvalds/linux/commit/dad48e73127ba10279ea33e6dbc8d3905c4d31c0 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dad48e73127ba10279ea33e6dbc8d3905c4d31c0 (MISC)
103147 (BID)
DSA-4188 (DEBIAN)
USN-3654-2 (UBUNTU)
USN-3654-1 (UBUNTU)
USN-3656-1 (UBUNTU)
CVE: CVE-2018-5750
CVE: CVE-2018-5750
Id:
CVE-2018-5750
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
Comment
: The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://patchwork.kernel.org/patch/10174835/ (CONFIRM)
1040319 (SECTRACK)
DSA-4120 (DEBIAN)
RHSA-2018:1062 (REDHAT)
RHSA-2018:0676 (REDHAT)
USN-3631-2 (UBUNTU)
USN-3631-1 (UBUNTU)
DSA-4187 (DEBIAN)
[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update (MLIST)
USN-3698-2 (UBUNTU)
USN-3697-2 (UBUNTU)
USN-3697-1 (UBUNTU)
USN-3698-1 (UBUNTU)
RHSA-2018:2948 (REDHAT)
CVE: CVE-2018-7995
CVE: CVE-2018-7995
Id:
CVE-2018-7995
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
Comment
: Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck<cpu number> directory. NOTE: a third party has indicated that this report is not security relevant
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://lkml.org/lkml/2018/3/2/970 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b3b7c4795ccab5be71f080774c45bbbcc75c2aaf (MISC)
103356 (BID)
https://bugzilla.suse.com/show_bug.cgi?id=1084755 (MISC)
DSA-4188 (DEBIAN)
DSA-4187 (DEBIAN)
[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update (MLIST)
USN-3654-2 (UBUNTU)
USN-3654-1 (UBUNTU)
USN-3656-1 (UBUNTU)
CVE: CVE-2017-17807
CVE: CVE-2017-17807
Id:
CVE-2017-17807
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
Comment
: The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE:
862 (Missing Authorization)
References:
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6 (CONFIRM)
https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b (CONFIRM)
DSA-4073 (DEBIAN)
102301 (BID)
DSA-4082 (DEBIAN)
[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update (MLIST)
USN-3617-2 (UBUNTU)
USN-3617-1 (UBUNTU)
USN-3620-2 (UBUNTU)
USN-3620-1 (UBUNTU)
USN-3619-1 (UBUNTU)
USN-3617-3 (UBUNTU)
USN-3619-2 (UBUNTU)
USN-3632-1 (UBUNTU)
CVE: CVE-2018-18386
CVE: CVE-2018-18386
Id:
CVE-2018-18386
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18386
Comment
: drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
LOW
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CWE:
704 (Incorrect Type Conversion or Cast)
References:
https://github.com/torvalds/linux/commit/966031f340185eddd05affcf72b740549f056348 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11 (MISC)
https://bugzilla.suse.com/show_bug.cgi?id=1094825 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=966031f340185eddd05affcf72b740549f056348 (MISC)
USN-3849-2 (UBUNTU)
USN-3849-1 (UBUNTU)
RHSA-2019:0831 (REDHAT)
Content available only for registered users!
ovaldb@altx-soft.com