Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.890833
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-833-1)
Summary:The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-833-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-833-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or have other impacts.

CVE-2014-9888

Russell King found that on ARM systems, memory allocated for DMA buffers was mapped with executable permission. This made it easier to exploit other vulnerabilities in the kernel.

CVE-2014-9895

Dan Carpenter found that the MEDIA_IOC_ENUM_LINKS ioctl on media devices resulted in an information leak.

CVE-2016-6786 / CVE-2016-6787 It was discovered that the performance events subsystem does not properly manage locks during certain migrations, allowing a local attacker to escalate privileges. This can be mitigated by disabling unprivileged use of performance events: sysctl kernel.perf_event_paranoid=3

CVE-2016-8405

Peter Pi of Trend Micro discovered that the frame buffer video subsystem does not properly check bounds while copying color maps to userspace, causing a heap buffer out-of-bounds read, leading to information disclosure.

CVE-2017-5549

It was discovered that the KLSI KL5KUSB105 serial USB device driver could log the contents of uninitialised kernel memory, resulting in an information leak.

CVE-2017-6001

Di Shen discovered a race condition between concurrent calls to the performance events subsystem, allowing a local attacker to escalate privileges. This flaw exists because of an incomplete fix of CVE-2016-6786. This can be mitigated by disabling unprivileged use of performance events: sysctl kernel.perf_event_paranoid=3

CVE-2017-6074

Andrey Konovalov discovered a use-after-free vulnerability in the DCCP networking code, which could result in denial of service or local privilege escalation. On systems that do not already have the dccp module loaded, this can be mitigated by disabling it: echo >> /etc/modprobe.d/disable-dccp.conf install dccp false

For Debian 7 Wheezy, these problems have been fixed in version 3.2.84-2.

For Debian 8 Jessie, these problems have been fixed in version 3.16.39-1+deb8u1 or earlier.

We recommend that you upgrade your linux packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'linux' package(s) on Debian 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9888
BugTraq ID: 92219
http://www.securityfocus.com/bid/92219
Common Vulnerability Exposure (CVE) ID: CVE-2014-9895
BugTraq ID: 92222
http://www.securityfocus.com/bid/92222
Common Vulnerability Exposure (CVE) ID: CVE-2016-6786
BugTraq ID: 94679
http://www.securityfocus.com/bid/94679
Debian Security Information: DSA-3791 (Google Search)
http://www.debian.org/security/2017/dsa-3791
Common Vulnerability Exposure (CVE) ID: CVE-2016-6787
Common Vulnerability Exposure (CVE) ID: CVE-2016-8405
BugTraq ID: 94686
http://www.securityfocus.com/bid/94686
Common Vulnerability Exposure (CVE) ID: CVE-2017-5549
BugTraq ID: 95715
http://www.securityfocus.com/bid/95715
http://www.openwall.com/lists/oss-security/2017/01/21/3
https://usn.ubuntu.com/3754-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-6001
BugTraq ID: 96264
http://www.securityfocus.com/bid/96264
http://www.openwall.com/lists/oss-security/2017/02/16/1
RedHat Security Advisories: RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2077
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
RedHat Security Advisories: RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1854
Common Vulnerability Exposure (CVE) ID: CVE-2017-6074
BugTraq ID: 96310
http://www.securityfocus.com/bid/96310
https://www.exploit-db.com/exploits/41457/
https://www.exploit-db.com/exploits/41458/
http://www.openwall.com/lists/oss-security/2017/02/22/3
RedHat Security Advisories: RHSA-2017:0293
http://rhn.redhat.com/errata/RHSA-2017-0293.html
RedHat Security Advisories: RHSA-2017:0294
http://rhn.redhat.com/errata/RHSA-2017-0294.html
RedHat Security Advisories: RHSA-2017:0295
http://rhn.redhat.com/errata/RHSA-2017-0295.html
RedHat Security Advisories: RHSA-2017:0316
http://rhn.redhat.com/errata/RHSA-2017-0316.html
RedHat Security Advisories: RHSA-2017:0323
http://rhn.redhat.com/errata/RHSA-2017-0323.html
RedHat Security Advisories: RHSA-2017:0324
http://rhn.redhat.com/errata/RHSA-2017-0324.html
RedHat Security Advisories: RHSA-2017:0345
http://rhn.redhat.com/errata/RHSA-2017-0345.html
RedHat Security Advisories: RHSA-2017:0346
http://rhn.redhat.com/errata/RHSA-2017-0346.html
RedHat Security Advisories: RHSA-2017:0347
http://rhn.redhat.com/errata/RHSA-2017-0347.html
RedHat Security Advisories: RHSA-2017:0365
http://rhn.redhat.com/errata/RHSA-2017-0365.html
RedHat Security Advisories: RHSA-2017:0366
http://rhn.redhat.com/errata/RHSA-2017-0366.html
RedHat Security Advisories: RHSA-2017:0403
http://rhn.redhat.com/errata/RHSA-2017-0403.html
RedHat Security Advisories: RHSA-2017:0501
http://rhn.redhat.com/errata/RHSA-2017-0501.html
RedHat Security Advisories: RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0932
RedHat Security Advisories: RHSA-2017:1209
https://access.redhat.com/errata/RHSA-2017:1209
http://www.securitytracker.com/id/1037876
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.