[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3313-1 linux -- linux

ID: oval:org.secpod.oval:def:602172Date: (C)2015-07-27   (M)2024-03-20
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation or denial of service. CVE-2015-3290 Andy Lutomirski discovered that the Linux kernel does not properly handle nested NMIs. A local, unprivileged user could use this flaw for privilege escalation. CVE-2015-3291 Andy Lutomirski discovered that under certain conditions a malicious userspace program can cause the kernel to skip NMIs leading to a denial of service. CVE-2015-4167 Carl Henrik Lunde discovered that the UDF implementation is missing a necessary length check. A local user that can mount devices could use this flaw to crash the system. CVE-2015-5157 Petr Matousek and Andy Lutomirski discovered that an NMI that interrupts userspace and encounters an IRET fault is incorrectly handled. A local, unprivileged user could use this flaw for denial of service or possibly for privilege escalation. CVE-2015-5364 It was discovered that the Linux kernel does not properly handle invalid UDP checksums. A remote attacker could exploit this flaw to cause a denial of service using a flood of UDP packets with invalid checksums. CVE-2015-5366 It was discovered that the Linux kernel does not properly handle invalid UDP checksums. A remote attacker can cause a denial of service against applications that use epoll by injecting a single packet with an invalid checksum.

Platform:
Debian 8.x
Product:
linux-image-3.16
Reference:
DSA-3313-1
CVE-2015-3290
CVE-2015-3291
CVE-2015-4167
CVE-2015-5157
CVE-2015-5364
CVE-2015-5366
CVE    6
CVE-2015-4167
CVE-2015-3291
CVE-2015-3290
CVE-2015-5364
...
CPE    2
cpe:/a:linux:linux_image:3.16
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies