EulerOS 2.0 SP1 : kernel (EulerOS-SA-2017-1001)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote EulerOS host is missing multiple security updates.

Description :

According to the versions of the kernel packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :

- arch/x86/kvm/vmx.c in the Linux kernel through 4.9
mismanages the #BP and #OF exceptions, which allows
guest OS users to cause a denial of service (guest OS
crash) by declining to handle an exception thrown by an
L2 guest.(CVE-2016-9588)

- The IP stack in the Linux kernel before 4.6 allows
remote attackers to cause a denial of service (stack
consumption and panic) or possibly have unspecified
other impact by triggering use of the GRO path for
packets with tunnel stacking, as demonstrated by
interleaved IPv4 headers and GRE headers, a related
issue to CVE-2016-7039.(CVE-2016-8666)

- The blk_rq_map_user_iov function in block/blk-map.c in
the Linux kernel before 4.8.14 does not properly
restrict the type of iterator, which allows local users
to read or write to arbitrary kernel memory locations
or cause a denial of service (use-after-free) by
leveraging access to a /dev/sg device.(CVE-2016-9576)

- Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel before
4.6.3 allows local users to cause a denial of service
(double free) or possibly have unspecified other impact
via a crafted application that makes sendmsg system
calls, leading to a free operation associated with a
new dump that started earlier than
anticipated.(CVE-2016-9806)

- The sg implementation in the Linux kernel through 4.9
does not properly restrict write operations in
situations where the KERNEL_DS option is set, which
allows local users to read or write to arbitrary kernel
memory locations or cause a denial of service
(use-after-free) by leveraging access to a /dev/sg
device, related to block/bsg.c and drivers/scsi/sg.c.
NOTE: this vulnerability exists because of an
incomplete fix for CVE-2016-9576.(CVE-2016-10088)

- A flaw was found in the Linux kernel's implementation
of the SCTP protocol. A remote attacker could trigger
an out-of-bounds read with an offset of up to 64kB
potentially causing the system to crash.
(CVE-2016-9555)

- The arch_pick_mmap_layout function in
arch/x86/mm/mmap.c in the Linux kernel through 4.5.2
does not properly randomize the legacy base address,
which makes it easier for local users to defeat the
intended restrictions on the ADDR_NO_RANDOMIZE flag,
and bypass the ASLR protection mechanism for a setuid
or setgid program, by disabling stack-consumption
resource limits.(CVE-2016-3672)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?d5780220

Solution :

Update the affected kernel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Huawei Local Security Checks

Nessus Plugin ID: 99848 ()

Bugtraq ID:

CVE ID: CVE-2016-10088
CVE-2016-3672
CVE-2016-8666
CVE-2016-9555
CVE-2016-9576
CVE-2016-9588
CVE-2016-9806

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now