CVE-2018-1000802 Fedora Security Update for python2 (FEDORA-2018-c3a5b2029a)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for python2 to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-c3a5b2029a: Fedora 28

FEDORA-2018-c3a5b2029a: Fedora 27

0daybank

CVE-2018-14645 Fedora Security Update for haproxy (FEDORA-2018-381ab64b59)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for haproxy to fix the vulnerability.

Affected OS:
Fedora 28

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-381ab64b59: Fedora 28

0daybank

CVE-2018-17175 Fedora Security Update for python-marshmallow (FEDORA-2018-cc9adc4808)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for python-marshmallow to fix the vulnerability.

Affected OS:
Fedora 27
Fedora 28

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-cc9adc4808: Fedora 27

FEDORA-2018-cc9adc4808: Fedora 28

0daybank

CVE-2017-15705 Fedora Security Update for spamassassin (FEDORA-2018-6ed251c42b)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for spamassassin to fix the vulnerability.

Affected OS:
Fedora 27

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information. Malicious users could also use this vulnerability to change all the contents or configuration on the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-6ed251c42b: Fedora 27

0daybank

Fedora Security Update for php-horde-horde (FEDORA-2018-1de045298c)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for php-horde-horde to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-1de045298c: Fedora 28

FEDORA-2018-1de045298c: Fedora 27

0daybank

CVE-2018-1000810 Fedora Security Update for rust (FEDORA-2018-0071ad34f4)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for rust to fix the vulnerability.

Affected OS:
Fedora 27
Fedora 28

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-0071ad34f4: Fedora 27

FEDORA-2018-0071ad34f4: Fedora 28

0daybank

Fedora Security Update for php-horde-Horde-Core (FEDORA-2018-1f64819623)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for php-horde-horde-core to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-1f64819623: Fedora 28

FEDORA-2018-1f64819623: Fedora 27

0daybank

CVE-2015-7746 NetApp Data ONTAP Authentication Bypass Vulnerability (NTAP-20151112-0001)

漏洞类别:General remote services

漏洞等级: 

漏洞信息

NetApp Data ONTAP is a data management software which allows unifying storage infrastructures across flash, disk and cloud.

NetApp Data ONTAP operating in 7-Mode allows unauthorized information disclosure or modification on volumes that have “.UTF-8” appended to the volume language.

Affected Versions:
NetApp Data ONTAP versions prior to 8.2.4, when operating in 7-Mode

QID Detection Logic:
This QID gets vulnerable version of NetApp ONTAP either via HTTP Banner or SNMP

NOTE:This vulnerability affects devices that are operating in 7-Mode and have “.UTF-8” appended to the volume language.

漏洞危害

An unauthenticated, remote attacker could exploit this vulnerability to retrieve sensitive information or modify volumes.

解决方案

Customers are advised to refer to NTAP-20151112-0001 for more information about patching this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

NTAP-20151112-0001

0daybank

CVE-2018-0737 Fedora Security Update for openssli (FEDORA-2018-520e4c5b4e)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for openssli to fix the vulnerability.

Affected OS:
Fedora 27
Fedora 28

漏洞危害

This vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-520e4c5b4e: Fedora 27

FEDORA-2018-520e4c5b4e: Fedora 28

0daybank

Fedora Security Update for zchunk (FEDORA-2018-6a92b4f75c)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for zchunk to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-6a92b4f75c: Fedora 28

FEDORA-2018-6a92b4f75c: Fedora 27

0daybank

CVE-2018-16790 Fedora Security Update for libbson (FEDORA-2018-77d864ff39)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for libbson to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

This vulnerability could be exploited to gain partial access to sensitive information. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-77d864ff39: Fedora 28

FEDORA-2018-77d864ff39: Fedora 27

0daybank

Detect Version of the Linux kernel and gcc in use

漏洞类别:Information gathering

漏洞等级: 

漏洞信息

The file /proc/version specifies the version of the Linux kernel and gcc in use, as well as the version of Linux installed on the system.

The raw output of ” cat /proc/version ” command, can be used to determine the unicity of the system and understand how memory dumps for that specific system should be handled.

QID Detection Logic :
This QID runs the ” cat /proc/version ” command to collect contents of the file.

漏洞危害

Not applicable.

解决方案

Not applicable.

0daybank

CVE-2018-15686 SUSE Enterprise Linux Security Update for systemd (SUSE-SU-2018:3767-1)

漏洞类别:SUSE

漏洞等级: 

漏洞信息

SUSE has released security update for systemd to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information.Malicious users could also use this vulnerability to change all the contents or configuration on the system.Additionally this vulnerability can also be used to cause a complete denial of service and could render the resource completely unavailable.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command “yum update”.

Refer to Suse security advisory SUSE-SU-2018:3767-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2018:3767-1: SUSE Enterprise Linux

0daybank

CVE-2018-12389 SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2018:3749-1)

漏洞类别:SUSE

漏洞等级: 

漏洞信息

SUSE has released security update for mozillafirefox to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information. Malicious users could also use this vulnerability to change all the contents or configuration on the system. Additionally this vulnerability can also be used to cause a complete denial of service and could render the resource completely unavailable.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command “yum update”.

Refer to SUSE security advisory SUSE-SU-2018:3749-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2018:3749-1: SUSE Enterprise Linux

0daybank

CVE-2017-1000407 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2018:3746-1)

漏洞类别:SUSE

漏洞等级: 

漏洞信息

SUSE has released security update for the linux kernel to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information. Malicious users could also use this vulnerability to change all the contents or configuration on the system. Additionally this vulnerability can also be used to cause a complete denial of service and could render the resource completely unavailable.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command “yum update”.

Refer to SUSE security advisory SUSE-SU-2018:3746-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2018:3746-1: SUSE Enterprise Linux

0daybank

CVE-2018-15471 Ubuntu Security Notification for Linux, Linux-aws, Linux-gcp, Linux-kvm, Linux-raspi2 Vulnerability (USN-3819-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the Xen netback driver in the Linux kernel did not properly perform input validation in some situations.

漏洞危害

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

0daybank

CVE-2018-1000030 Ubuntu Security Notification for Python2.7, Python3.4, Python3.5 Vulnerabilities (USN-3817-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that Python incorrectly handled large amounts of data.

It was discovered that Python incorrectly handled running external commands in the shutil module.

It was discovered that Python incorrectly used regular expressions vulnerable to catastrophic backtracking.

It was discovered that Python failed to initialize Expat’s hash salt.

漏洞危害

A remote attacker could use this issue to cause Python to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-1000030)

A remote attacker could use this issue to cause Python to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-1000802)

A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-1060, CVE-2018-1061)

A remote attacker could possibly use this issue to cause hash collisions, leading to a denial of service. (CVE-2018-14647)

0daybank

CVE-2016-9588 Ubuntu Security Notification for Linux Vulnerabilities (USN-3822-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the KVM implementation in the Linux kernel mismanages the #BP and #OF exceptions.

It was discovered that the generic SCSI driver in the Linux kernel did not properly enforce permissions on kernel memory access.

It was discovered that the CDC USB Ethernet driver did not properly validate device descriptors.

It was discovered that an integer overflow existed in the CD-ROM driver of the Linux kernel.

It was discovered that an integer overflow existed in the HID Bluetooth implementation in the Linux kernel that could lead to a buffer overwrite.

漏洞危害

A local attacker in a guest virtual machine could use this to cause a denial of service (guest OS crash). (CVE-2016-9588)

A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2017-13168)

A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649)

A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-16658)

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-9363)

0daybank

CVE-2018-10880 Ubuntu Security Notification for Linux, Linux-aws, Linux-kvm, Linux-raspi2, Linux-snapdragon Vulnerabilities (USN-3821-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the ext4 filesystem implementation in the Linux kernel did not properly ensure that xattr information remained in inode bodies.

It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability.

It was discovered that the f2fs filesystem implementation in the Linux kernel did not properly validate metadata.

It was and Po-Ning Tseng discovered that the btrfs filesystem implementation in the Linux kernel did not properly handle relocations in some situations.

It was discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations.

it was discovered that the procfs file system implementation in the Linux kernel did not properly restrict the ability to inspect the kernel stack of an arbitrary task.

It was discovered that the KVM implementation in the Linux kernel on ARM 64bit processors did not properly handle some ioctls.

漏洞危害

An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash). (CVE-2018-10880)

A local attacker could use this to cause a denial of service. (CVE-2018-13053)

An attacker could use this to construct a malicious f2fs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13096)

An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14609)

An attacker could use this to construct a malicious HFS+ image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14617)

A local attacker could use this to expose sensitive information. (CVE-2018-17972)

An attacker with the privilege to create KVM-based virtual machines could use this to cause a denial of service (host system crash) or execute arbitrary code in the host. (CVE-2018-18021)

解决方案

Refer to Ubuntu advisory USN-3821-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3821-1: 16.04 (Xenial) on src (linux-image-snapdragon)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-generic-lpae)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc-e500mc)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc64-emb)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-generic)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc64-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc64-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-aws)

USN-3821-1: 16.04 (Xenial) on src (linux-image-raspi2)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1100-raspi2)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-lowlatency)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1072-aws)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1037-kvm)

USN-3821-1: 16.04 (Xenial) on src (linux-image-generic-lpae)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-lowlatency)

USN-3821-1: 16.04 (Xenial) on src (linux-image-generic)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc-e500mc)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1104-snapdragon)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc64-emb)

USN-3821-1: 16.04 (Xenial) on src (linux-image-kvm)

0daybank

CVE-2017-13168 Ubuntu Security Notification for Linux, Linux-aws, Linux-azure, Linux-gcp, Linux-kvm, Linux-oem, Linux-raspi2 Vulnerabilities (USN-3820-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the Xen netback driver in the Linux kernel did not properly perform input validation in some situations.

It was discovered that the generic SCSI driver in the Linux kernel did not properly enforce permissions on kernel memory access.

It was discovered that an integer overflow existed in the CD-ROM driver of the Linux kernel.

It was discovered that an integer overflow existed in the HID Bluetooth implementation in the Linux kernel that could lead to a buffer overwrite.

漏洞危害

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-15471)

A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2017-13168)

A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-16658)

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-9363)

0daybank