Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.2.2017.772
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-772-1)
Summary:The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-772-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux' package(s) announced via the DLA-772-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

CVE-2012-6704 / CVE-2016-9793 Eric Dumazet found that a local user with CAP_NET_ADMIN capability could set a socket's buffer size to be negative, leading to a denial of service or other security impact. Additionally, in kernel versions prior to 3.5, any user could do this if sysctl net.core.rmem_max was changed to a very large value.

CVE-2015-1350 / #770492 Ben Harris reported that local users could remove set-capability attributes from any file visible to them, allowing a denial of service.

CVE-2015-8962

Calvin Owens fouund that removing a SCSI device while it was being accessed through the SCSI generic (sg) driver led to a double free, possibly causing a denial of service (crash or memory corruption) or privilege escalation. This could be exploited by local users with permision to access a SCSI device node.

CVE-2015-8963

Sasha Levin reported that hot-unplugging a CPU resulted in a use-after-free by the performance events (perf) subsystem, possibly causing a denial of service (crash or memory corruption) or privilege escalation. This could by exploited by any local user.

CVE-2015-8964

It was found that the terminal/serial (tty) subsystem did not reliably reset the terminal buffer state when the terminal line discipline was changed. This could allow a local user with access to a terminal device to read sensitive information from kernel memory.

CVE-2016-7097

Jan Kara found that changing the POSIX ACL of a file never cleared its set-group-ID flag, which should be done if the user changing it is not a member of the group-owner. In some cases, this would allow the user-owner of an executable to gain the privileges of the group-owner.

CVE-2016-7910

Vegard Nossum discovered that a memory allocation failure while handling a read of /proc/diskstats or /proc/partitions could lead to a use-after-free, possibly causing a denial of service (crash or memory corruption) or privilege escalation.

CVE-2016-7911

Dmitry Vyukov reported that a race between ioprio_get() and ioprio_set() system calls could result in a use-after-free, possibly causing a denial of service (crash) or leaking sensitive information.

CVE-2016-7915

Benjamin Tissoires found that HID devices could trigger an out-of bounds memory access in the HID core. A physically present user could possibly use this for denial of service (crash) or to leak sensitive information.

CVE-2016-8399

Qidan He reported that the IPv4 ping socket implementation did not validate the length of packets to be sent. A user with permisson to use ping sockets could cause an out-of-bounds read, possibly resulting in a denial of service or information leak. However, on Debian systems no users have permission to create ping sockets by default.

CVE-2016-8633

Eyal Itkin reported that the ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux' package(s) on Debian 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-6704
BugTraq ID: 95135
http://www.securityfocus.com/bid/95135
http://www.openwall.com/lists/oss-security/2016/12/03/1
Common Vulnerability Exposure (CVE) ID: CVE-2015-1350
BugTraq ID: 76075
http://www.securityfocus.com/bid/76075
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770492
http://marc.info/?l=linux-kernel&m=142153722930533&w=2
http://www.openwall.com/lists/oss-security/2015/01/24/5
Common Vulnerability Exposure (CVE) ID: CVE-2015-8962
BugTraq ID: 94187
http://www.securityfocus.com/bid/94187
Common Vulnerability Exposure (CVE) ID: CVE-2015-8963
BugTraq ID: 94207
http://www.securityfocus.com/bid/94207
Common Vulnerability Exposure (CVE) ID: CVE-2015-8964
BugTraq ID: 94138
http://www.securityfocus.com/bid/94138
Common Vulnerability Exposure (CVE) ID: CVE-2016-10088
BugTraq ID: 95169
http://www.securityfocus.com/bid/95169
http://www.openwall.com/lists/oss-security/2016/12/30/1
RedHat Security Advisories: RHSA-2017:0817
http://rhn.redhat.com/errata/RHSA-2017-0817.html
RedHat Security Advisories: RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2077
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
http://www.securitytracker.com/id/1037538
Common Vulnerability Exposure (CVE) ID: CVE-2016-7097
1038201
http://www.securitytracker.com/id/1038201
92659
http://www.securityfocus.com/bid/92659
RHSA-2017:0817
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
USN-3146-1
http://www.ubuntu.com/usn/USN-3146-1
USN-3146-2
http://www.ubuntu.com/usn/USN-3146-2
USN-3147-1
http://www.ubuntu.com/usn/USN-3147-1
[linux-fsdevel] 20160526 [PATCH 2/2] posix_acl: Clear SGID bit when modifying file permissions
http://www.spinics.net/lists/linux-fsdevel/msg98328.html
[linux-fsdevel] 20160819 [PATCH v2] posix_acl: Clear SGID bit when setting file permissions
http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2
[oss-security] 20160826 Re: CVE request -- linux kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit
http://www.openwall.com/lists/oss-security/2016/08/26/3
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073931017b49d9458aa351605b43a7e34598caef
https://bugzilla.redhat.com/show_bug.cgi?id=1368938
https://github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
https://source.android.com/security/bulletin/2017-04-01
https://support.f5.com/csp/article/K31603170?utm_source=f5support&amp%3Butm_medium=RSS
Common Vulnerability Exposure (CVE) ID: CVE-2016-7910
BugTraq ID: 94135
http://www.securityfocus.com/bid/94135
RedHat Security Advisories: RHSA-2017:0892
https://access.redhat.com/errata/RHSA-2017:0892
RedHat Security Advisories: RHSA-2017:1297
https://access.redhat.com/errata/RHSA-2017:1297
RedHat Security Advisories: RHSA-2017:1298
https://access.redhat.com/errata/RHSA-2017:1298
RedHat Security Advisories: RHSA-2017:1308
https://access.redhat.com/errata/RHSA-2017:1308
Common Vulnerability Exposure (CVE) ID: CVE-2016-7911
Common Vulnerability Exposure (CVE) ID: CVE-2016-7915
RedHat Security Advisories: RHSA-2016:2574
http://rhn.redhat.com/errata/RHSA-2016-2574.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-8399
BugTraq ID: 94708
http://www.securityfocus.com/bid/94708
RedHat Security Advisories: RHSA-2017:0869
https://access.redhat.com/errata/RHSA-2017:0869
RedHat Security Advisories: RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2930
RedHat Security Advisories: RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:2931
Common Vulnerability Exposure (CVE) ID: CVE-2016-8633
94149
http://www.securityfocus.com/bid/94149
RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:0676
RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1062
RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1170
RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:1190
[oss-security] 20161106 Re: [engineering.redhat.com #426293] CVE Request - firewire driver RCE - linux 4.8
http://www.openwall.com/lists/oss-security/2016/11/06/1
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=667121ace9dbafb368618dbabcf07901c962ddac
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7
https://bugzilla.redhat.com/show_bug.cgi?id=1391490
https://eyalitkin.wordpress.com/2016/11/06/cve-publication-cve-2016-8633/
https://github.com/torvalds/linux/commit/667121ace9dbafb368618dbabcf07901c962ddac
Common Vulnerability Exposure (CVE) ID: CVE-2016-8645
1037285
http://www.securitytracker.com/id/1037285
94264
http://www.securityfocus.com/bid/94264
[oss-security] 20161111 CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c
http://www.openwall.com/lists/oss-security/2016/11/11/3
[oss-security] 20161130 Re: CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c
http://www.openwall.com/lists/oss-security/2016/11/30/3
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac6e780070e30e4c35bd395acfe9191e6268bdd3
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.10
https://bugzilla.redhat.com/show_bug.cgi?id=1393904
https://github.com/torvalds/linux/commit/ac6e780070e30e4c35bd395acfe9191e6268bdd3
Common Vulnerability Exposure (CVE) ID: CVE-2016-8655
1037403
http://www.securitytracker.com/id/1037403
1037968
http://www.securitytracker.com/id/1037968
40871
https://www.exploit-db.com/exploits/40871/
44696
https://www.exploit-db.com/exploits/44696/
94692
http://www.securityfocus.com/bid/94692
RHSA-2017:0386
http://rhn.redhat.com/errata/RHSA-2017-0386.html
RHSA-2017:0387
http://rhn.redhat.com/errata/RHSA-2017-0387.html
RHSA-2017:0402
http://rhn.redhat.com/errata/RHSA-2017-0402.html
SUSE-SU-2016:3096
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html
SUSE-SU-2016:3113
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html
SUSE-SU-2016:3116
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html
SUSE-SU-2016:3117
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html
SUSE-SU-2016:3169
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html
SUSE-SU-2016:3183
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html
SUSE-SU-2016:3197
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html
SUSE-SU-2016:3205
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html
SUSE-SU-2016:3206
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html
SUSE-SU-2016:3247
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html
USN-3149-1
http://www.ubuntu.com/usn/USN-3149-1
USN-3149-2
http://www.ubuntu.com/usn/USN-3149-2
USN-3150-1
http://www.ubuntu.com/usn/USN-3150-1
USN-3150-2
http://www.ubuntu.com/usn/USN-3150-2
USN-3151-1
http://www.ubuntu.com/usn/USN-3151-1
USN-3151-2
http://www.ubuntu.com/usn/USN-3151-2
USN-3151-3
http://www.ubuntu.com/usn/USN-3151-3
USN-3151-4
http://www.ubuntu.com/usn/USN-3151-4
USN-3152-1
http://www.ubuntu.com/usn/USN-3152-1
USN-3152-2
http://www.ubuntu.com/usn/USN-3152-2
[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root)
http://www.openwall.com/lists/oss-security/2016/12/06/1
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html
https://bugzilla.redhat.com/show_bug.cgi?id=1400019
https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c
https://source.android.com/security/bulletin/2017-03-01.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9178
BugTraq ID: 94144
http://www.securityfocus.com/bid/94144
http://www.openwall.com/lists/oss-security/2016/11/04/4
Common Vulnerability Exposure (CVE) ID: CVE-2016-9555
BugTraq ID: 94479
http://www.securityfocus.com/bid/94479
http://www.openwall.com/lists/oss-security/2016/11/22/18
RedHat Security Advisories: RHSA-2017:0086
http://rhn.redhat.com/errata/RHSA-2017-0086.html
RedHat Security Advisories: RHSA-2017:0091
http://rhn.redhat.com/errata/RHSA-2017-0091.html
RedHat Security Advisories: RHSA-2017:0113
http://rhn.redhat.com/errata/RHSA-2017-0113.html
RedHat Security Advisories: RHSA-2017:0307
http://rhn.redhat.com/errata/RHSA-2017-0307.html
http://www.securitytracker.com/id/1037339
SuSE Security Announcement: SUSE-SU-2016:3096 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3113 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3116 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3117 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3169 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3183 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3197 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3205 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3206 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3247 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-9576
94821
http://www.securityfocus.com/bid/94821
SUSE-SU-2016:3146
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
SUSE-SU-2016:3188
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
SUSE-SU-2016:3203
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
SUSE-SU-2016:3217
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
SUSE-SU-2016:3248
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
SUSE-SU-2016:3252
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface
http://www.openwall.com/lists/oss-security/2016/12/08/19
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
https://bugzilla.redhat.com/show_bug.cgi?id=1403145
https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0
openSUSE-SU-2016:3085
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html
openSUSE-SU-2016:3086
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00041.html
openSUSE-SU-2016:3118
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9756
94615
http://www.securityfocus.com/bid/94615
[oss-security] 20161201 CVE request: Kernel: kvm: stack memory information leakage
http://www.openwall.com/lists/oss-security/2016/12/01/1
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2117d5398c81554fbf803f5fd1dc55eb78216c0c
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12
https://bugzilla.redhat.com/show_bug.cgi?id=1400468
https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c
openSUSE-SU-2017:0002
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9793
BugTraq ID: 94655
http://www.securityfocus.com/bid/94655
https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
RedHat Security Advisories: RHSA-2017:0931
https://access.redhat.com/errata/RHSA-2017:0931
RedHat Security Advisories: RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0932
RedHat Security Advisories: RHSA-2017:0933
https://access.redhat.com/errata/RHSA-2017:0933
Common Vulnerability Exposure (CVE) ID: CVE-2016-9794
BugTraq ID: 94654
http://www.securityfocus.com/bid/94654
http://www.openwall.com/lists/oss-security/2016/12/03/2
SuSE Security Announcement: SUSE-SU-2016:3146 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3188 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3203 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3217 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3248 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:3252 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:3118 (Google Search)
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.