logo
DATABASE RESOURCES PRICING ABOUT US

linux - security update

Description

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. * [CVE-2016-10905](https://security-tracker.debian.org/tracker/CVE-2016-10905) A race condition was discovered in the GFS2 file-system implementation, which could lead to a use-after-free. On a system using GFS2, a local attacker could use this for denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2018-20976](https://security-tracker.debian.org/tracker/CVE-2018-20976) It was discovered that the XFS file-system implementation did not correctly handle some mount failure conditions, which could lead to a use-after-free. The security impact of this is unclear. * [CVE-2018-21008](https://security-tracker.debian.org/tracker/CVE-2018-21008) It was discovered that the rsi wifi driver did not correctly handle some failure conditions, which could lead to a use-after-free. The security impact of this is unclear. * [CVE-2019-0136](https://security-tracker.debian.org/tracker/CVE-2019-0136) It was discovered that the wifi soft-MAC implementation (mac80211) did not properly authenticate Tunneled Direct Link Setup (TDLS) messages. A nearby attacker could use this for denial of service (loss of wifi connectivity). * [CVE-2019-9506](https://security-tracker.debian.org/tracker/CVE-2019-9506) Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered a weakness in the Bluetooth pairing protocols, dubbed the KNOB attack. An attacker that is nearby during pairing could use this to weaken the encryption used between the paired devices, and then to eavesdrop on and/or spoof communication between them. This update mitigates the attack by requiring a minimum encryption key length of 56 bits. * [CVE-2019-14814](https://security-tracker.debian.org/tracker/CVE-2019-14814), [CVE-2019-14815](https://security-tracker.debian.org/tracker/CVE-2019-14815), [CVE-2019-14816](https://security-tracker.debian.org/tracker/CVE-2019-14816) Multiple bugs were discovered in the mwifiex wifi driver, which could lead to heap buffer overflows. A local user permitted to configure a device handled by this driver could probably use this for privilege escalation. * [CVE-2019-14821](https://security-tracker.debian.org/tracker/CVE-2019-14821) Matt Delco reported a race condition in KVM's coalesced MMIO facility, which could lead to out-of-bounds access in the kernel. A local attacker permitted to access /dev/kvm could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-14835](https://security-tracker.debian.org/tracker/CVE-2019-14835) Peter Pi of Tencent Blade Team discovered a missing bounds check in vhost\_net, the network back-end driver for KVM hosts, leading to a buffer overflow when the host begins live migration of a VM. An attacker in control of a VM could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation on the host. * [CVE-2019-15117](https://security-tracker.debian.org/tracker/CVE-2019-15117) Hui Peng and Mathias Payer reported a missing bounds check in the usb-audio driver's descriptor parsing code, leading to a buffer over-read. An attacker able to add USB devices could possibly use this to cause a denial of service (crash). * [CVE-2019-15118](https://security-tracker.debian.org/tracker/CVE-2019-15118) Hui Peng and Mathias Payer reported unbounded recursion in the usb-audio driver's descriptor parsing code, leading to a stack overflow. An attacker able to add USB devices could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-15211](https://security-tracker.debian.org/tracker/CVE-2019-15211) The syzkaller tool found a bug in the radio-raremono driver that could lead to a use-after-free. An attacker able to add and remove USB devices could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-15212](https://security-tracker.debian.org/tracker/CVE-2019-15212) The syzkaller tool found that the rio500 driver does not work correctly if more than one device is bound to it. An attacker able to add USB devices could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-15215](https://security-tracker.debian.org/tracker/CVE-2019-15215) The syzkaller tool found a bug in the cpia2\_usb driver that leads to a use-after-free. An attacker able to add and remove USB devices could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-15218](https://security-tracker.debian.org/tracker/CVE-2019-15218) The syzkaller tool found that the smsusb driver did not validate that USB devices have the expected endpoints, potentially leading to a null pointer dereference. An attacker able to add USB devices could use this to cause a denial of service (BUG/oops). * [CVE-2019-15219](https://security-tracker.debian.org/tracker/CVE-2019-15219) The syzkaller tool found that a device initialisation error in the sisusbvga driver could lead to a null pointer dereference. An attacker able to add USB devices could use this to cause a denial of service (BUG/oops). * [CVE-2019-15220](https://security-tracker.debian.org/tracker/CVE-2019-15220) The syzkaller tool found a race condition in the p54usb driver which could lead to a use-after-free. An attacker able to add and remove USB devices could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-15221](https://security-tracker.debian.org/tracker/CVE-2019-15221) The syzkaller tool found that the line6 driver did not validate USB devices' maximum packet sizes, which could lead to a heap buffer overrun. An attacker able to add USB devices could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-15292](https://security-tracker.debian.org/tracker/CVE-2019-15292) The Hulk Robot tool found missing error checks in the Appletalk protocol implementation, which could lead to a use-after-free. The security impact of this is unclear. * [CVE-2019-15807](https://security-tracker.debian.org/tracker/CVE-2019-15807) Jian Luo reported that the Serial Attached SCSI library (libsas) did not correctly handle failure to discover devices beyond a SAS expander. This could lead to a resource leak and crash (BUG). The security impact of this is unclear. * [CVE-2019-15917](https://security-tracker.debian.org/tracker/CVE-2019-15917) The syzkaller tool found a race condition in code supporting UART-attached Bluetooth adapters, which could lead to a use after-free. A local user with access to a pty device or other suitable tty device could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. * [CVE-2019-15926](https://security-tracker.debian.org/tracker/CVE-2019-15926) It was found that the ath6kl wifi driver did not consistently validate traffic class numbers in received control packets, leading to out-of-bounds memory accesses. A nearby attacker on the same wifi network could use this to cause a denial of service (memory corruption or crash) or possibly for privilege escalation. For Debian 8 Jessie, these problems have been fixed in version 3.16.74-1. We recommend that you upgrade your linux packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>


Affected Software


CPE Name Name Version
linux 3.16.64-2
linux 3.16.7-ckt20-1+deb8u1
linux 3.16.48-1
linux 3.16.7-ckt11-1+deb8u3
linux 3.16.39-1+deb8u1
linux 3.16.39-1+deb8u2
linux 3.16.7-ckt11-1+deb8u3~bpo70+1
linux 3.16.7-ckt11-1+deb8u6~bpo70+1
linux 3.16.7-ckt11-1+deb8u4
linux 3.16.72-1
linux 3.16.51-1
linux 3.16.7-ckt20-1+deb8u2~bpo70+1
linux 3.16.7-ckt9-3~deb8u1~bpo70+1
linux 3.16.70-1
linux 3.16.39-1+deb8u1~bpo70+1
linux 3.16.39-1~bpo70+1
linux 3.16.56-1
linux 3.16.7-ckt11-1
linux 3.16.7-ckt11-1~bpo70+1
linux 3.16.7-ckt25-2
linux 3.16.43-2+deb8u4
linux 3.16.51-3
linux 3.16.57-2
linux 3.16.64-1
linux 3.16.68-1
linux 3.16.57-1
linux 3.16.7-ckt20-1+deb8u3
linux 3.16.7-ckt25-2~bpo70+1
linux 3.16.7-ckt20-1+deb8u3~bpo70+1
linux 3.16.7-ckt20-1+deb8u4~bpo70+1
linux 3.16.43-2+deb8u3
linux 3.16.7-ckt11-1+deb8u4~bpo70+1
linux 3.16.36-1+deb8u1
linux 3.16.7-ckt25-1
linux 3.16.39-1+deb8u1~bpo70+1+gcc4.4
linux 3.16.7-ckt20-1
linux 3.16.7-ckt25-1~bpo70+1
linux 3.16.59-1
linux 3.16.43-2+deb8u1
linux 3.16.7-ckt11-1+deb8u2~bpo70+1
linux 3.16.7-ckt17-1
linux 3.16.7-ckt25-2+deb8u1
linux 3.16.43-1
linux 3.16.36-1+deb8u1~bpo70+1
linux 3.16.68-2
linux 3.16.56-1+deb8u1
linux 3.16.7-ckt9-3
linux 3.16.7-ckt11-1+deb8u1
linux 3.16.43-2+deb8u2
linux 3.16.7-ckt25-2+deb8u3~bpo70+1
linux 3.16.43-2
linux 3.16.36-1+deb8u2~bpo70+1
linux 3.16.7-ckt11-1+deb8u6
linux 3.16.7-ckt11-1+deb8u2
linux 3.16.7-ckt25-2+deb8u2
linux 3.16.7-ckt20-1+deb8u2
linux 3.16.36-1
linux 3.16.51-2
linux 3.16.36-1+deb8u2
linux 3.16.7-ckt9-2
linux 3.16.51-3+deb8u1
linux 3.16.39-1
linux 3.16.7-ckt20-1+deb8u4
linux 3.16.43-2+deb8u5
linux 3.16.7-ckt9-3~deb8u1
linux 3.16.7-ckt25-2+deb8u3
linux 3.16.7-ckt11-1+deb8u5

Related