Mise à jour effectuée.

Arnaud




Le 13/10/2015 11:55, Ben Hutchings a écrit :
> -------------------------------------------------------------------------
> Debian Security Advisory DSA-3372-1                   secur...@debian.org
> https://www.debian.org/security/                            Ben Hutchings
> October 13, 2015                      https://www.debian.org/security/faq
> -------------------------------------------------------------------------
>
> Package        : linux
> CVE ID         : CVE-2015-2925 CVE-2015-5257 CVE-2015-5283 CVE-2015-7613
>
> Several vulnerabilities have been discovered in the Linux kernel that
> may lead to a privilege escalation, denial of service, unauthorised
> information disclosure or unauthorised information modification.
>
> CVE-2015-2925
>
>     Jann Horn discovered that when a subdirectory of a filesystem was
>     bind-mounted into a chroot or mount namespace, a user that should
>     be confined to that chroot or namespace could access the whole of
>     that filesystem if they had write permission on an ancestor of
>     the subdirectory.  This is not a common configuration for wheezy,
>     and the issue has previously been fixed for jessie.
>
> CVE-2015-5257
>
>     Moein Ghasemzadeh of Istuary Innovation Labs reported that a USB
>     device could cause a denial of service (crash) by imitating a
>     Whiteheat USB serial device but presenting a smaller number of
>     endpoints.
>
> CVE-2015-5283
>
>     Marcelo Ricardo Leitner discovered that creating multiple SCTP
>     sockets at the same time could cause a denial of service (crash)
>     if the sctp module had not previously been loaded.  This issue
>     only affects jessie.
>
> CVE-2015-7613
>
>     Dmitry Vyukov discovered that System V IPC objects (message queues
>     and shared memory segments) were made accessible before their
>     ownership and other attributes were fully initialised.  If a local
>     user can race against another user or service creating a new IPC
>     object, this may result in unauthorised information disclosure,
>     unauthorised information modification, denial of service and/or
>     privilege escalation.
>
>     A similar issue existed with System V semaphore arrays, but was
>     less severe because they were always cleared before being fully
>     initialised.
>
> For the oldstable distribution (wheezy), these problems have been fixed
> in version 3.2.68-1+deb7u5.
>
> For the stable distribution (jessie), these problems have been fixed in
> version 3.16.7-ckt11-1+deb8u5.
>
> For the unstable distribution (sid), these problems have been fixed in
> version 4.2.3-1 or earlier versions.
>
> We recommend that you upgrade your linux packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org
>

-- 

A plus Christophe
==================



Reply via email to