Debian DSA-4313-1 : linux - security update

Medium Nessus Plugin ID 118023


The remote Debian host is missing a security-related update.


Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information

- CVE-2018-15471 (XSA-270)
Felix Wilhelm of Google Project Zero discovered a flaw
in the hash handling of the xen-netback Linux kernel
module. A malicious or buggy frontend may cause the
(usually privileged) backend to make out of bounds
memory accesses, potentially resulting in privilege
escalation, denial of service, or information leaks.

- CVE-2018-18021
It was discovered that the KVM subsystem on the arm64
platform does not properly handle the KVM_SET_ON_REG
ioctl. An attacker who can create KVM based virtual
machines can take advantage of this flaw for denial of
service (hypervisor panic) or privilege escalation
(arbitrarily redirect the hypervisor flow of control
with full register control).


Upgrade the linux packages.

For the stable distribution (stretch), these problems have been fixed
in version 4.9.110-3+deb9u6.

See Also

Plugin Details

Severity: Medium

ID: 118023

File Name: debian_DSA-4313.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2018/10/10

Modified: 2018/11/13

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux, cpe:/o:debian:debian_linux:9.0

Patch Publication Date: 2018/10/08

Reference Information

CVE: CVE-2018-15471, CVE-2018-18021

DSA: 4313