Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180508) (Meltdown)

critical Nessus Plugin ID 109643

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Security Fix(es) :

- hw: cpu: speculative execution permission faults handling (CVE-2017-5754)

- Kernel: error in exception handling leads to DoS (CVE-2018-8897)

- kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645)

- kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)

- kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166)

- kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)

- kernel: Stack information leak in the EFS element (CVE-2017-1000410)

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?b41a480c

Plugin Details

Severity: Critical

ID: 109643

File Name: sl_20180508_kernel_on_SL6_x.nasl

Version: 1.8

Type: local

Agent: unix

Published: 5/9/2018

Updated: 10/11/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-18017

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:kernel-debug, p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo, p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-i686, p-cpe:/a:fermilab:scientific_linux:kernel-doc, x-cpe:/o:fermilab:scientific_linux, p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-x86_64, p-cpe:/a:fermilab:scientific_linux:python-perf-debuginfo, p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel, p-cpe:/a:fermilab:scientific_linux:kernel-devel, p-cpe:/a:fermilab:scientific_linux:kernel-headers, p-cpe:/a:fermilab:scientific_linux:perf-debuginfo, p-cpe:/a:fermilab:scientific_linux:python-perf, p-cpe:/a:fermilab:scientific_linux:kernel, p-cpe:/a:fermilab:scientific_linux:kernel-firmware, p-cpe:/a:fermilab:scientific_linux:kernel-debug-debuginfo, p-cpe:/a:fermilab:scientific_linux:perf, p-cpe:/a:fermilab:scientific_linux:kernel-abi-whitelists

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/8/2018

Vulnerability Publication Date: 4/18/2017

Exploitable With

Metasploit (Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability)

Reference Information

CVE: CVE-2017-1000410, CVE-2017-13166, CVE-2017-18017, CVE-2017-5754, CVE-2017-7645, CVE-2017-8824, CVE-2018-8897

IAVA: 2018-A-0019