Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3631-2)

high Nessus Plugin ID 109315

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 14.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-3631-2 advisory.

- A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions:
Android kernel. Android ID: A-70526974. (CVE-2017-13305)

- drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner). (CVE-2017-16538)

- In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition. (CVE-2018-1000004)

- The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
(CVE-2018-5750)

- The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user. (CVE-2018-7566)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

https://ubuntu.com/security/notices/USN-3631-2

Plugin Details

Severity: High

ID: 109315

File Name: ubuntu_USN-3631-2.nasl

Version: 1.10

Type: local

Agent: unix

Published: 4/24/2018

Updated: 1/9/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-16538

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2018-7566

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1017-aws, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-121-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-121-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-121-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-121-powerpc-e500mc, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-121-powerpc-smp, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-121-powerpc64-emb, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-121-powerpc64-smp, cpe:/o:canonical:ubuntu_linux:14.04:-:lts

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/24/2018

Vulnerability Publication Date: 11/4/2017

Reference Information

CVE: CVE-2017-13305, CVE-2017-16538, CVE-2018-1000004, CVE-2018-5750, CVE-2018-7566

USN: 3631-2