Description: | Summary: The remote host is missing an update for the Debian 'linux' package(s) announced via the DSA-3696-1 advisory.
Vulnerability Insight: Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2015-8956
It was discovered that missing input sanitising in RFCOMM Bluetooth socket handling may result in denial of service or information leak.
CVE-2016-5195
It was discovered that a race condition in the memory management code can be used for local privilege escalation.
CVE-2016-7042
Ondrej Kozina discovered that incorrect buffer allocation in the proc_keys_show() function may result in local denial of service.
CVE-2016-7425
Marco Grassi discovered a buffer overflow in the arcmsr SCSI driver which may result in local denial of service, or potentially, arbitrary code execution.
Additionally this update fixes a regression introduced in DSA-3616-1 causing iptables performance issues (cf. Debian Bug #831014).
For the stable distribution (jessie), these problems have been fixed in version 3.16.36-1+deb8u2.
We recommend that you upgrade your linux packages.
Affected Software/OS: 'linux' package(s) on Debian 8.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|