Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.703448
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-3448-1)
Summary:The remote host is missing an update for the Debian 'linux' package(s) announced via the DSA-3448-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux' package(s) announced via the DSA-3448-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation or denial-of-service.

CVE-2013-4312

Tetsuo Handa discovered that it is possible for a process to open far more files than the process' limit leading to denial-of-service conditions.

CVE-2015-7566

Ralf Spenneberg of OpenSource Security reported that the visor driver crashes when a specially crafted USB device without bulk-out endpoint is detected.

CVE-2015-8767

An SCTP denial-of-service was discovered which can be triggered by a local attacker during a heartbeat timeout event after the 4-way handshake.

CVE-2016-0723

A use-after-free vulnerability was discovered in the TIOCGETD ioctl. A local attacker could use this flaw for denial-of-service.

CVE-2016-0728

The Perception Point research team discovered a use-after-free vulnerability in the keyring facility, possibly leading to local privilege escalation.

For the stable distribution (jessie), these problems have been fixed in version 3.16.7-ckt20-1+deb8u3.

We recommend that you upgrade your linux packages.

Affected Software/OS:
'linux' package(s) on Debian 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-4312
82986
http://www.securityfocus.com/bid/82986
DSA-3448
http://www.debian.org/security/2016/dsa-3448
DSA-3503
http://www.debian.org/security/2016/dsa-3503
FEDORA-2016-2f25d12c51
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html
FEDORA-2016-5d43766e33
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
RHSA-2016:0855
http://rhn.redhat.com/errata/RHSA-2016-0855.html
RHSA-2016:2574
http://rhn.redhat.com/errata/RHSA-2016-2574.html
RHSA-2016:2584
http://rhn.redhat.com/errata/RHSA-2016-2584.html
USN-2929-1
http://www.ubuntu.com/usn/USN-2929-1
USN-2929-2
http://www.ubuntu.com/usn/USN-2929-2
USN-2931-1
http://www.ubuntu.com/usn/USN-2931-1
USN-2932-1
http://www.ubuntu.com/usn/USN-2932-1
USN-2967-1
http://www.ubuntu.com/usn/USN-2967-1
USN-2967-2
http://www.ubuntu.com/usn/USN-2967-2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=712f4aad406bb1ed67f3f98d04c044191f0ff593
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
https://bugzilla.redhat.com/show_bug.cgi?id=1297813
https://github.com/torvalds/linux/commit/712f4aad406bb1ed67f3f98d04c044191f0ff593
https://security-tracker.debian.org/tracker/CVE-2013-4312
Common Vulnerability Exposure (CVE) ID: CVE-2015-7566
20160309 OS-S 2016-09 Linux visor clie_5_attach Nullpointer Dereference CVE-2015-7566
http://www.securityfocus.com/archive/1/537733/100/0/threaded
39540
https://www.exploit-db.com/exploits/39540/
82975
http://www.securityfocus.com/bid/82975
FEDORA-2016-26e19f042a
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
FEDORA-2016-b59fd603be
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
SUSE-SU-2016:1672
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
SUSE-SU-2016:1707
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
SUSE-SU-2016:1764
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
SUSE-SU-2016:2074
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
USN-2930-1
http://www.ubuntu.com/usn/USN-2930-1
USN-2930-2
http://www.ubuntu.com/usn/USN-2930-2
USN-2930-3
http://www.ubuntu.com/usn/USN-2930-3
USN-2948-1
http://www.ubuntu.com/usn/USN-2948-1
USN-2948-2
http://www.ubuntu.com/usn/USN-2948-2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
https://bugzilla.redhat.com/show_bug.cgi?id=1283371
https://bugzilla.redhat.com/show_bug.cgi?id=1296466
https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
https://security-tracker.debian.org/tracker/CVE-2015-7566
Common Vulnerability Exposure (CVE) ID: CVE-2015-8767
BugTraq ID: 80268
http://www.securityfocus.com/bid/80268
Debian Security Information: DSA-3448 (Google Search)
Debian Security Information: DSA-3503 (Google Search)
http://www.openwall.com/lists/oss-security/2016/01/11/4
RedHat Security Advisories: RHSA-2016:0715
http://rhn.redhat.com/errata/RHSA-2016-0715.html
RedHat Security Advisories: RHSA-2016:1277
https://access.redhat.com/errata/RHSA-2016:1277
RedHat Security Advisories: RHSA-2016:1301
https://access.redhat.com/errata/RHSA-2016:1301
RedHat Security Advisories: RHSA-2016:1341
https://access.redhat.com/errata/RHSA-2016:1341
SuSE Security Announcement: SUSE-SU-2016:0911 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
SuSE Security Announcement: SUSE-SU-2016:1102 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
SuSE Security Announcement: SUSE-SU-2016:2074 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-0723
1035695
http://www.securitytracker.com/id/1035695
82950
http://www.securityfocus.com/bid/82950
SUSE-SU-2016:0911
SUSE-SU-2016:1102
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
http://source.android.com/security/bulletin/2016-07-01.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
https://bugzilla.redhat.com/show_bug.cgi?id=1296253
https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
https://security-tracker.debian.org/tracker/CVE-2016-0723
https://support.f5.com/csp/article/K43650115
openSUSE-SU-2016:1008
Common Vulnerability Exposure (CVE) ID: CVE-2016-0728
1034701
http://www.securitytracker.com/id/1034701
39277
https://www.exploit-db.com/exploits/39277/
81054
http://www.securityfocus.com/bid/81054
HPSBHF03436
https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05018265
RHSA-2016:0064
http://rhn.redhat.com/errata/RHSA-2016-0064.html
RHSA-2016:0065
http://rhn.redhat.com/errata/RHSA-2016-0065.html
RHSA-2016:0068
http://rhn.redhat.com/errata/RHSA-2016-0068.html
SUSE-SU-2016:0205
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html
SUSE-SU-2016:0341
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.html
SUSE-SU-2016:0745
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
SUSE-SU-2016:0746
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
SUSE-SU-2016:0747
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
SUSE-SU-2016:0750
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
SUSE-SU-2016:0751
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
SUSE-SU-2016:0752
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
SUSE-SU-2016:0753
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
SUSE-SU-2016:0755
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
SUSE-SU-2016:0756
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
SUSE-SU-2016:0757
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
USN-2870-1
http://www.ubuntu.com/usn/USN-2870-1
USN-2870-2
http://www.ubuntu.com/usn/USN-2870-2
USN-2871-1
http://www.ubuntu.com/usn/USN-2871-1
USN-2871-2
http://www.ubuntu.com/usn/USN-2871-2
USN-2872-1
http://www.ubuntu.com/usn/USN-2872-1
USN-2872-2
http://www.ubuntu.com/usn/USN-2872-2
USN-2872-3
http://www.ubuntu.com/usn/USN-2872-3
USN-2873-1
http://www.ubuntu.com/usn/USN-2873-1
[oss-security] 20160119 Linux kernel: use after free in keyring facility.
http://www.openwall.com/lists/oss-security/2016/01/19/2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
http://source.android.com/security/bulletin/2016-03-01.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
https://bto.bluecoat.com/security-advisory/sa112
https://bugzilla.redhat.com/show_bug.cgi?id=1297475
https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://security.netapp.com/advisory/ntap-20160211-0001/
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.