exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3426-1

Debian Security Advisory 3426-1
Posted Dec 18, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3426-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, information leak or data loss.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2013-7446, CVE-2015-7799, CVE-2015-7833, CVE-2015-8104, CVE-2015-8374, CVE-2015-8543
SHA-256 | eefa8528c8f76d273a5ac0c5e68a8ee3b0c177db643785311de84b9e1b210774

Debian Security Advisory 3426-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3426-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 17, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2013-7446 CVE-2015-7799 CVE-2015-7833 CVE-2015-8104
CVE-2015-8374 CVE-2015-8543

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, information leak
or data loss.

CVE-2013-7446

Dmitry Vyukov discovered that a particular sequence of valid
operations on local (AF_UNIX) sockets can result in a
use-after-free. This may be used to cause a denial of service
(crash) or possibly for privilege escalation.

CVE-2015-7799

It was discovered that a user granted access to /dev/ppp can cause a
denial of service (crash) by passing invalid parameters to the
PPPIOCSMAXCID ioctl. This also applies to ISDN PPP device nodes.

CVE-2015-7833

Sergej Schumilo, Hendrik Schwartke and Ralf Spenneberg discovered a
flaw in the processing of certain USB device descriptors in the
usbvision driver. An attacker with physical access to the system can
use this flaw to crash the system. This was partly fixed by the
changes listed in DSA 3396-1.

CVE-2015-8104

Jan Beulich reported a guest to host denial-of-service flaw
affecting the KVM hypervisor running on AMD processors. A malicious
guest can trigger an infinite stream of "debug" (#DB) exceptions
causing the processor microcode to enter an infinite loop where the
core never receives another interrupt. This leads to a panic of the
host kernel.

CVE-2015-8374

It was discovered that Btrfs did not correctly implement truncation
of compressed inline extents. This could lead to an information
leak, if a file is truncated and later made readable by other users.
Additionally, it could cause data loss. This has been fixed for the
stable distribution (jessie) only.

CVE-2015-8543

It was discovered that a local user permitted to create raw sockets
could cause a denial-of-service by specifying an invalid protocol
number for the socket. The attacker must have the CAP_NET_RAW
capability in their user namespace. This has been fixed for the
stable distribution (jessie) only.

For the oldstable distribution (wheezy), these problems have been fixed
in version 3.2.73-2+deb7u1. In addition, this update contains several
changes originally targeted for the upcoming Wheezy point release.

For the stable distribution (jessie), these problems have been fixed in
version 3.16.7-ckt20-1+deb8u1. In addition, this update contains several
changes originally targeted for the upcoming Jessie point release.

We recommend that you upgrade your linux packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Kms+
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close