DSA-3426-1

Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-3426-1.json
Published
2015-12-17T00:00:00Z
Modified
2023-06-28T06:26:11.242065Z
Details

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, information leak or data loss.

  • CVE-2013-7446 Dmitry Vyukov discovered that a particular sequence of valid operations on local (AF_UNIX) sockets can result in a use-after-free. This may be used to cause a denial of service (crash) or possibly for privilege escalation.
  • CVE-2015-7799 It was discovered that a user granted access to /dev/ppp can cause a denial of service (crash) by passing invalid parameters to the PPPIOCSMAXCID ioctl. This also applies to ISDN PPP device nodes.
  • CVE-2015-7833 Sergej Schumilo, Hendrik Schwartke and Ralf Spenneberg discovered a flaw in the processing of certain USB device descriptors in the usbvision driver. An attacker with physical access to the system can use this flaw to crash the system. This was partly fixed by the changes listed in DSA 3396-1.
  • CVE-2015-8104 Jan Beulich reported a guest to host denial-of-service flaw affecting the KVM hypervisor running on AMD processors. A malicious guest can trigger an infinite stream of debug (#DB) exceptions causing the processor microcode to enter an infinite loop where the core never receives another interrupt. This leads to a panic of the host kernel.
  • CVE-2015-8374 It was discovered that Btrfs did not correctly implement truncation of compressed inline extents. This could lead to an information leak, if a file is truncated and later made readable by other users. Additionally, it could cause data loss. This has been fixed for the stable distribution (jessie) only.
  • CVE-2015-8543 It was discovered that a local user permitted to create raw sockets could cause a denial-of-service by specifying an invalid protocol number for the socket. The attacker must have the CAP_NET_RAW capability in their user namespace. This has been fixed for the stable distribution (jessie) only.

For the oldstable distribution (wheezy), these problems have been fixed in version 3.2.73-2+deb7u1. In addition, this update contains several changes originally targeted for the upcoming Wheezy point release.

For the stable distribution (jessie), these problems have been fixed in version 3.16.7-ckt20-1+deb8u1. In addition, this update contains several changes originally targeted for the upcoming Jessie point release.

We recommend that you upgrade your linux packages.

References

Affected packages

Debian:7 / linux

Source Details

Package Name
linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
3.2.73-2+deb7u1

Affected versions

3.*

3.2.41-2
3.2.41-2+deb7u1
3.2.41-2+deb7u2~bpo60+1
3.2.41-2+deb7u2
3.2.46-1~bpo60+1
3.2.46-1
3.2.46-1+deb7u1~bpo60+1
3.2.46-1+deb7u1
3.2.51-1~bpo60+1
3.2.51-1
3.2.53-1
3.2.53-2
3.2.54-1
3.2.54-2~bpo60+1
3.2.54-2
3.2.57-1
3.2.57-2
3.2.57-3
3.2.57-3+deb7u1
3.2.57-3+deb7u2~bpo60+1
3.2.57-3+deb7u2
3.2.60-1
3.2.60-1+deb7u1
3.2.60-1+deb7u2
3.2.60-1+deb7u3~bpo60+1
3.2.60-1+deb7u3
3.2.63-1
3.2.63-2
3.2.63-2+deb7u1~bpo60+1
3.2.63-2+deb7u1
3.2.63-2+deb7u2~bpo60+1
3.2.63-2+deb7u2
3.2.65-1
3.2.65-1+deb7u1~bpo60+1
3.2.65-1+deb7u1
3.2.65-1+deb7u2~bpo60+1
3.2.65-1+deb7u2
3.2.68-1
3.2.68-1+deb7u1~bpo60+1
3.2.68-1+deb7u1
3.2.68-1+deb7u2~bpo60+1
3.2.68-1+deb7u2
3.2.68-1+deb7u3~bpo60+1
3.2.68-1+deb7u3
3.2.68-1+deb7u4~bpo60+1
3.2.68-1+deb7u4
3.2.68-1+deb7u5
3.2.68-1+deb7u6~bpo60+1
3.2.68-1+deb7u6
3.2.71-1
3.2.71-2
3.2.73-1
3.2.73-2

Debian:8 / linux

Source Details

Package Name
linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
3.16.7-ckt20-1+deb8u1

Affected versions

3.*

3.16.7-ckt9-2
3.16.7-ckt9-3~deb8u1~bpo70+1
3.16.7-ckt9-3~deb8u1
3.16.7-ckt9-3
3.16.7-ckt11-1~bpo70+1
3.16.7-ckt11-1
3.16.7-ckt11-1+deb8u1
3.16.7-ckt11-1+deb8u2~bpo70+1
3.16.7-ckt11-1+deb8u2
3.16.7-ckt11-1+deb8u3~bpo70+1
3.16.7-ckt11-1+deb8u3
3.16.7-ckt11-1+deb8u4~bpo70+1
3.16.7-ckt11-1+deb8u4
3.16.7-ckt11-1+deb8u5
3.16.7-ckt11-1+deb8u6~bpo70+1
3.16.7-ckt11-1+deb8u6
3.16.7-ckt17-1
3.16.7-ckt20-1