SynopsisThe remote Debian host is missing a security update.
DescriptionThis security upload has been prepared in cooperation of the Debian Kernel, Security and LTS Teams and features the upstream stable release 184.108.40.206 (see https://lkml.org/lkml/2014/11/23/181 for more information for that). It fixes the CVEs described below.
Note: if you are using the openvz flavors, please consider three things: a.) we haven't got any feedback on them (while we have for all other flavors) b.) so do your test before deploying them and c.) once you have done so, please give feedback to [email protected]
If you are not using openvz flavors, please still consider b+c :-)
Fix the sock_setsockopt function to prevent local users from being able to cause a denial of service (system crash) attack.
Fix a XEN priviledge escalation, which allowed guest OS users to gain guest OS priviledges.
Fix the mISDN_sock_recvmsg function to prevent local users from obtaining sensitive information from kernel memory.
MIPS platform: prevent local users from bypassing intended PR_SET_SECCOMP restrictions.
Prevent local users from causing a denial of service (OOPS and system crash) when syscall auditing is enabled .
CVE-2014-4653 CVE-2014-4654 CVE-2014-4655
Fix the ALSA control implementation to prevent local users from causing a denial of service attack and from obtaining sensitive information from kernel memory.
Fix PPPoL2TP feature to prevent local users to from gaining privileges.
Prevent remote attackers from causing a denial of service attack involving SCTP.
Fix the parse_rock_ridge_inode_internal function to prevent local users from causing a denial of service attack via a crafted iso9660 images.
Fix the do_double_fault function to prevent local users from causing a denial of service (panic) attack.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpgrade the affected packages.