Lucene search

K
debianDebianDEBIAN:DLA-155-1:5E8B0
HistoryFeb 18, 2015 - 11:22 p.m.

[SECURITY] [DLA 155-1] linux-2.6 security update

2015-02-1823:22:13
lists.debian.org
23

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.5%

Package : linux-2.6
Version : 2.6.32-48squeeze11
CVE ID : CVE-2013-6885 CVE-2014-7822 CVE-2014-8133 CVE-2014-8134
CVE-2014-8160 CVE-2014-9420 CVE-2014-9584 CVE-2014-9585
CVE-2015-1421 CVE-2015-1593

This update fixes the CVEs described below.

A further issue, CVE-2014-9419, was considered, but appears to require
extensive changes with a consequent high risk of regression. It is
now unlikely to be fixed in squeeze-lts.

CVE-2013-6885

It was discovered that under specific circumstances, a combination
of write operations to write-combined memory and locked CPU
instructions may cause a core hang on AMD 16h 00h through 0Fh
processors. A local user can use this flaw to mount a denial of
service (system hang) via a crafted application.

For more information please refer to the AMD CPU erratum 793 in
http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf

CVE-2014-7822

It was found that the splice() system call did not validate the
given file offset and length. A local unprivileged user can use
this flaw to cause filesystem corruption on ext4 filesystems, or
possibly other effects.

CVE-2014-8133

It was found that the espfix functionality can be bypassed by
installing a 16-bit RW data segment into GDT instead of LDT (which
espfix checks for) and using it for stack. A local unprivileged user
could potentially use this flaw to leak kernel stack addresses.

CVE-2014-8134

It was found that the espfix functionality is wrongly disabled in
a 32-bit KVM guest. A local unprivileged user could potentially
use this flaw to leak kernel stack addresses.

CVE-2014-8160

It was found that a netfilter (iptables or ip6tables) rule
accepting packets to a specific SCTP, DCCP, GRE or UDPlite
port/endpoint could result in incorrect connection tracking state.
If only the generic connection tracking module (nf_conntrack) was
loaded, and not the protocol-specific connection tracking module,
this would allow access to any port/endpoint of the specified
protocol.

CVE-2014-9420

It was found that the ISO-9660 filesystem implementation (isofs)
follows arbitrarily long chains, including loops, of Continuation
Entries (CEs). This allows local users to mount a denial of
service via a crafted disc image.

CVE-2014-9584

It was found that the ISO-9660 filesystem implementation (isofs)
does not validate a length value in the Extensions Reference (ER)
System Use Field, which allows local users to obtain sensitive
information from kernel memory via a crafted disc image.

CVE-2014-9585

It was discovered that address randomisation for the vDSO in
64-bit processes is extremely biassed. A local unprivileged user
could potentially use this flaw to bypass the ASLR protection
mechanism.

CVE-2015-1421

It was found that the SCTP implementation could free
authentication state while it was still in use, resulting in heap
corruption. This could allow remote users to cause a denial of
service or privilege escalation.

CVE-2015-1593

It was found that address randomisation for the initial stack in
64-bit processes was limited to 20 rather than 22 bits of entropy.
A local unprivileged user could potentially use this flaw to
bypass the ASLR protection mechanism.


Ben Hutchings - Debian developer, kernel team member
Attachment:
signature.asc
Description: This is a digitally signed message part

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.5%