linux - security update


Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. * [CVE-2015-8956](https://security-tracker.debian.org/tracker/CVE-2015-8956) It was discovered that missing input sanitising in RFCOMM Bluetooth socket handling may result in denial of service or information leak. * [CVE-2016-5195](https://security-tracker.debian.org/tracker/CVE-2016-5195) It was discovered that a race condition in the memory management code can be used for local privilege escalation. This does not affect kernels built with PREEMPT\_RT enabled. * [CVE-2016-7042](https://security-tracker.debian.org/tracker/CVE-2016-7042) Ondrej Kozina discovered that incorrect buffer allocation in the proc\_keys\_show() function may result in local denial of service. * [CVE-2016-7425](https://security-tracker.debian.org/tracker/CVE-2016-7425) Marco Grassi discovered a buffer overflow in the arcmsr SCSI driver which may result in local denial of service, or potentially, arbitrary code execution. For Debian 7 Wheezy, these problems have been fixed in version 3.2.82-1. This version also includes bug fixes from upstream version 3.2.82 and updates the PREEMPT\_RT featureset to version 3.2.82-rt119. For Debian 8 Jessie, these problems have been fixed in version 3.16.36-1+deb8u2. We recommend that you upgrade your linux packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>

Affected Software

CPE Name Name Version
linux 3.2.68-1+deb7u3~bpo60+1
linux 3.2.60-1+deb7u3~bpo60+1
linux 3.2.54-1
linux 3.2.41-2
linux 3.2.46-1~bpo60+1
linux 3.2.81-1
linux 3.2.57-1
linux 3.2.60-1+deb7u3
linux 3.2.68-1+deb7u4~bpo60+1
linux 3.2.65-1+deb7u2
linux 3.2.41-2+deb7u2~bpo60+1
linux 3.2.41-2+deb7u1
linux 3.2.63-2+deb7u2
linux 3.2.57-3+deb7u2~bpo60+1
linux 3.2.54-2~bpo60+1
linux 3.2.63-2+deb7u2~bpo60+1
linux 3.2.60-1
linux 3.2.68-1+deb7u4
linux 3.2.63-2+deb7u1~bpo60+1
linux 3.2.53-1
linux 3.2.73-2+deb7u1
linux 3.2.73-2+deb7u2
linux 3.2.54-2
linux 3.2.63-2
linux 3.2.81-2
linux 3.2.73-1
linux 3.2.68-1+deb7u1~bpo60+1
linux 3.2.71-1
linux 3.2.63-2+deb7u1
linux 3.2.41-2+deb7u2
linux 3.2.53-2
linux 3.2.78-1
linux 3.2.68-1+deb7u2
linux 3.2.63-1
linux 3.2.68-1+deb7u5
linux 3.2.57-3+deb7u2
linux 3.2.73-2+deb7u2~bpo60+1
linux 3.2.68-1
linux 3.2.46-1+deb7u1
linux 3.2.68-1+deb7u3
linux 3.2.73-2+deb7u3
linux 3.2.68-1+deb7u6~bpo60+1
linux 3.2.68-1+deb7u1
linux 3.2.46-1+deb7u1~bpo60+1
linux 3.2.68-1+deb7u6
linux 3.2.46-1
linux 3.2.60-1+deb7u1
linux 3.2.57-3
linux 3.2.57-3+deb7u1
linux 3.2.65-1+deb7u1~bpo60+1
linux 3.2.71-2
linux 3.2.68-1+deb7u2~bpo60+1
linux 3.2.65-1+deb7u1
linux 3.2.51-1
linux 3.2.57-2
linux 3.2.65-1+deb7u2~bpo60+1
linux 3.2.51-1~bpo60+1
linux 3.2.60-1+deb7u2
linux 3.2.65-1
linux 3.2.73-2