feito e reboot a DNSes e Radius que assenta em serviços UDP realizado. On 7 August 2015 at 08:18, Salvatore Bonaccorso <car...@debian.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > - ------------------------------------------------------------------------- > Debian Security Advisory DSA-3329-1 secur...@debian.org > https://www.debian.org/security/ Salvatore Bonaccorso > August 07, 2015 https://www.debian.org/security/faq > - ------------------------------------------------------------------------- > > Package : linux > CVE ID : CVE-2015-1333 CVE-2015-3212 CVE-2015-4692 CVE-2015-4700 > CVE-2015-5364 CVE-2015-5366 CVE-2015-5697 CVE-2015-5706 > CVE-2015-5707 > > Several vulnerabilities have been discovered in the Linux kernel > that may lead to a privilege escalation, denial of service or > information leak. > > CVE-2015-1333 > > Colin Ian King discovered a flaw in the add_key function of the > Linux kernel's keyring subsystem. A local user can exploit this flaw > to cause a denial of service due to memory exhaustion. > > CVE-2015-3212 > > Ji Jianwen of Red Hat Engineering discovered a flaw in the handling > of the SCTPs automatic handling of dynamic multi-homed connections. > A local attacker could use this flaw to cause a crash or potentially > for privilege escalation. > > CVE-2015-4692 > > A NULL pointer dereference flaw was found in the > kvm_apic_has_events function in the KVM subsystem. A unprivileged > local user could exploit this flaw to crash the system kernel > resulting in denial of service. > > CVE-2015-4700 > > Daniel Borkmann discovered a flaw in the Linux kernel implementation > of the Berkeley Packet Filter which can be used by a local user to > crash the system. > > CVE-2015-5364 > > It was discovered that the Linux kernel does not properly handle > invalid UDP checksums. A remote attacker could exploit this flaw to > cause a denial of service using a flood of UDP packets with invalid > checksums. > > CVE-2015-5366 > > It was discovered that the Linux kernel does not properly handle > invalid UDP checksums. A remote attacker can cause a denial of > service against applications that use epoll by injecting a single > packet with an invalid checksum. > > CVE-2015-5697 > > A flaw was discovered in the md driver in the Linux kernel leading > to an information leak. > > CVE-2015-5706 > > An user triggerable use-after-free vulnerability in path lookup in > the Linux kernel could potentially lead to privilege escalation. > > CVE-2015-5707 > > An integer overflow in the SCSI generic driver in the Linux kernel > was discovered. A local user with write permission on a SCSI generic > device could potentially exploit this flaw for privilege escalation. > > For the oldstable distribution (wheezy), these problems have been fixed > in version 3.2.68-1+deb7u3. CVE-2015-1333, CVE-2015-4692 and > CVE-2015-5706 do not affect the wheezy distribution. > > For the stable distribution (jessie), these problems have been fixed in > version 3.16.7-ckt11-1+deb8u3, except CVE-2015-5364 and CVE-2015-5366 > which were fixed already in DSA-3313-1. > > For the unstable distribution (sid), these problems have been fixed in > version 4.1.3-1 or earlier versions. > > We recommend that you upgrade your linux packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: https://www.debian.org/security/ > > Mailing list: debian-security-annou...@lists.debian.org > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBCgAGBQJVxFhxAAoJEAVMuPMTQ89Ew5wQAJtibxM4B5zSP8svVyhcDOWy > bmBlyxP5ibxgtq+mh5jPO8R9W18LnZE7Bz6z0lGkOfwcmWbfsIPBLES3mHhwskZq > HK9r+h4rh82Ydn7OC3pKISayxCyWcHQ/9lCPQ5qsv3/ZZn9/G0hq+zYDubT6M7c9 > QdppP0dg8+pF+8ZhWjy1Jpl3EY5IwdNojx6oXD4VyK7c8gZlpX2FGdaQ9Sc6v8Cm > 0Nj5UJFSosrJqa8HEuV6XwrWmj27onIqjGsVuU9F8L2282uOZdA8fEe8u7mheeH1 > n0cziRhkGVdmkdCHWrkZOHq3FrldRpMMUP7c4nLilmXECaJRiHmeXYJzYQTdebIB > 9MkLT3qQI07c1LDTtugAiRMuuMOt9Y7P5o5adAtTfyKcfpy6pp7E8zhmKBAHFx90 > hnjYIg/kM6Fd+Xmm18d1mQIVA8rRtI6sYfnpUPrsfhtLZibcHgyKTq9FiLBjZ70R > TLq8jFGs9mWEh+0C0z4/C8sOMrE9uDujy6kOaBzxfNRvlaXjr9DuusOwCjl+Ygqy > 8ylhgJ70+31FQst8xsnkOBOUYdZ3yWJ2winjRLiMLmII/haWGGNdhZeVdwNMUAHY > 0OdVcqUBxsHpXr6tHU9s1fMzhPHzD92ApaCOupTbxroRGgm6wxnXUPZAPYkMFNQa > 4ouuRAK0QohqIRquuebC > =Ra/9 > -----END PGP SIGNATURE----- > > > -- > To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org > with a subject of "unsubscribe". Trouble? Contact > listmas...@lists.debian.org > Archive: https://lists.debian.org/e1znbvj-0001ko...@master.debian.org > > -- Regards, -- Rui Ribeiro Senior Sysadm ISCTE-IUL https://www.linkedin.com/pub/rui-ribeiro/16/ab8/434