Description: | Summary: The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-670-1 advisory.
Vulnerability Insight: Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2015-8956
It was discovered that missing input sanitising in RFCOMM Bluetooth socket handling may result in denial of service or information leak.
CVE-2016-5195
It was discovered that a race condition in the memory management code can be used for local privilege escalation. This does not affect kernels built with PREEMPT_RT enabled.
CVE-2016-7042
Ondrej Kozina discovered that incorrect buffer allocation in the proc_keys_show() function may result in local denial of service.
CVE-2016-7425
Marco Grassi discovered a buffer overflow in the arcmsr SCSI driver which may result in local denial of service, or potentially, arbitrary code execution.
For Debian 7 Wheezy, these problems have been fixed in version 3.2.82-1. This version also includes bug fixes from upstream version 3.2.82 and updates the PREEMPT_RT featureset to version 3.2.82-rt119.
For Debian 8 Jessie, these problems have been fixed in version 3.16.36-1+deb8u2.
We recommend that you upgrade your linux packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]
Affected Software/OS: 'linux' package(s) on Debian 7.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|