Debian DSA-4313-1 : linux - security update

High Nessus Plugin ID 118023

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

- CVE-2018-15471 (XSA-270) Felix Wilhelm of Google Project Zero discovered a flaw in the hash handling of the xen-netback Linux kernel module. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in privilege escalation, denial of service, or information leaks.

- CVE-2018-18021 It was discovered that the KVM subsystem on the arm64 platform does not properly handle the KVM_SET_ON_REG ioctl. An attacker who can create KVM based virtual machines can take advantage of this flaw for denial of service (hypervisor panic) or privilege escalation (arbitrarily redirect the hypervisor flow of control with full register control).

Solution

Upgrade the linux packages.

For the stable distribution (stretch), these problems have been fixed in version 4.9.110-3+deb9u6.

See Also

https://security-tracker.debian.org/tracker/CVE-2018-15471

https://security-tracker.debian.org/tracker/CVE-2018-18021

https://security-tracker.debian.org/tracker/linux

https://packages.debian.org/source/stretch/linux

http://www.debian.org/security/2018/dsa-4313

Plugin Details

Severity: High

ID: 118023

File Name: debian_DSA-4313.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2018/10/10

Modified: 2018/10/10

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2018/10/08

Reference Information

CVE: CVE-2018-15471, CVE-2018-18021

DSA: 4313