Hi, if you unsubscribe from mailing list, You can follow instructions on this URL: https://www.debian.org/MailingLists/#subunsub Or use this form : https://www.debian.org/MailingLists/unsubscribe
2016-01-19 20:46 GMT+02:00 James Barrett <xuc...@gmail.com>: > Please stop sending me these emails. > On Jan 19, 2016 7:40 AM, "Salvatore Bonaccorso" <car...@debian.org> wrote: > >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA512 >> >> - >> ------------------------------------------------------------------------- >> Debian Security Advisory DSA-3448-1 secur...@debian.org >> https://www.debian.org/security/ Salvatore Bonaccorso >> January 19, 2016 https://www.debian.org/security/faq >> - >> ------------------------------------------------------------------------- >> >> Package : linux >> CVE ID : CVE-2013-4312 CVE-2015-7566 CVE-2015-8767 CVE-2016-0723 >> CVE-2016-0728 >> >> Several vulnerabilities have been discovered in the Linux kernel that >> may lead to a privilege escalation or denial-of-service. >> >> CVE-2013-4312 >> >> Tetsuo Handa discovered that it is possible for a process to open >> far more files than the process' limit leading to denial-of-service >> conditions. >> >> CVE-2015-7566 >> >> Ralf Spenneberg of OpenSource Security reported that the visor >> driver crashes when a specially crafted USB device without bulk-out >> endpoint is detected. >> >> CVE-2015-8767 >> >> An SCTP denial-of-service was discovered which can be triggered by a >> local attacker during a heartbeat timeout event after the 4-way >> handshake. >> >> CVE-2016-0723 >> >> A use-after-free vulnerability was discovered in the TIOCGETD ioctl. >> A local attacker could use this flaw for denial-of-service. >> >> CVE-2016-0728 >> >> The Perception Point research team discovered a use-after-free >> vulnerability in the keyring facility, possibly leading to local >> privilege escalation. >> >> For the stable distribution (jessie), these problems have been fixed in >> version 3.16.7-ckt20-1+deb8u3. >> >> We recommend that you upgrade your linux packages. >> >> Further information about Debian Security Advisories, how to apply >> these updates to your system and frequently asked questions can be >> found at: https://www.debian.org/security/ >> >> Mailing list: debian-security-annou...@lists.debian.org >> -----BEGIN PGP SIGNATURE----- >> Version: GnuPG v1 >> >> iQIcBAEBCgAGBQJWni1mAAoJEAVMuPMTQ89EYvkP/Rmqrwxv1M+z4qj3OmfF81Q+ >> zj5Kd9nrvolH/asFac3URBHurSQby3JRgwxtqJuTrc68xBn147CQWaDM5nU9/HBi >> Dt3eceDxsGBo9W8FJEpE6Yk4a3NyNiEOnT7gLFfSjFkmyGr3a6+7b1VPAEcsDeBV >> FbA40UhrDnZYoeqqBFOGqedzFBioSafd+AQOYNqCjNByNq5i3SxMgS3XCECrruUr >> yGfR+0RD5EibvcUddzduuGOvjmaW+mPK6OTVir2f6AwJFdSOJEegkSZRkLeBJgYL >> Lfk131dlJ6gwelAaGOJA9wAqSPVIFe9h+jFh2DTQ6q5Lrg5dchkibbb2eSuoqRO1 >> Fa1cXW33k8YSilTzvy7pO1Snrp2YhGKK3RPo5PNAsdmOiuzSkI9PUw+khz/TtJ9N >> XSKmOGd3ZT3R81UuEiXTdJVzVsRS+jLpgQ2jjOlvDb5ldQgn9tirL36/isSRcM64 >> IGnJlLHxhzBv+GQyziVDy37ois2dYT3in6ls2tI7rHoYhaEyOwPyCn98/IJqPxea >> SIeLGxStaaCGqgDaFqCJbRuAZGFqpwZLKSd9/HycA7jTJbfrdzD74eDFc8LvGYly >> Il1vpT8Ekfxh9L4o+HkzVkme7dkYt5SmLGvN1euTUdjsuo87r3OwN0OKVhXrFoAV >> qaetOmH+fJB1/jo9jPLH >> =fylF >> -----END PGP SIGNATURE----- >> >> -- //selametle Hasan AKGÖZ http://www.hasanakgoz.com