EulerOS 2.0 SP1 : kernel (EulerOS-SA-2016-1026)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote EulerOS host is missing multiple security updates.

Description :

According to the versions of the kernel packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :

- It was found that the Linux kernel KVM subsystem's
sysenter instruction emulation was not sufficient. An
unprivileged guest user could use this flaw to escalate
their privileges by tricking the hypervisor to emulate
a SYSENTER instruction in 16-bit mode, if the guest OS
did not initialize the SYSENTER model-specific
registers (MSRs). (CVE-2015-0239)

- A flaw was found in the way the Linux kernel's perf
subsystem retrieved userlevel stack traces on PowerPC
systems. A local, unprivileged user could use this flaw
to cause a denial of service on the system by creating
a special stack layout that would force the
perf_callchain_user_64() function into an infinite

- A flaw was found in the way the Linux kernel's ASN.1
DER decoder processed certain certificate files with
tags of indefinite length. A local, unprivileged user
could use a specially crafted X.509 certificate DER
file to crash the system or, potentially, escalate
their privileges on the system.(CVE-2016-0758)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

Solution :

Update the affected kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true

Family: Huawei Local Security Checks

Nessus Plugin ID: 99789 ()

Bugtraq ID: 72842

CVE ID: CVE-2015-0239

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now