Debian DSA-3696-1 : linux - security update (Dirty COW)

High Nessus Plugin ID 94146

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.7

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

- CVE-2015-8956 It was discovered that missing input sanitising in RFCOMM Bluetooth socket handling may result in denial of service or information leak.

- CVE-2016-5195 It was discovered that a race condition in the memory management code can be used for local privilege escalation.

- CVE-2016-7042 Ondrej Kozina discovered that incorrect buffer allocation in the proc_keys_show() function may result in local denial of service.

- CVE-2016-7425 Marco Grassi discovered a buffer overflow in the arcmsr SCSI driver which may result in local denial of service, or potentially, arbitrary code execution.

Additionally this update fixes a regression introduced in DSA-3616-1 causing iptables performance issues (cf. Debian Bug #831014).

Solution

Upgrade the linux packages.

For the stable distribution (jessie), these problems have been fixed in version 3.16.36-1+deb8u2.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=831014

https://security-tracker.debian.org/tracker/CVE-2015-8956

https://security-tracker.debian.org/tracker/CVE-2016-5195

https://security-tracker.debian.org/tracker/CVE-2016-7042

https://security-tracker.debian.org/tracker/CVE-2016-7425

https://packages.debian.org/source/jessie/linux

https://www.debian.org/security/2016/dsa-3696

Plugin Details

Severity: High

ID: 94146

File Name: debian_DSA-3696.nasl

Version: 2.15

Type: local

Agent: unix

Published: 2016/10/20

Updated: 2021/01/11

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 9.7

CVSS v2.0

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/10/19

Vulnerability Publication Date: 2016/10/10

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2015-8956, CVE-2016-5195, CVE-2016-7042, CVE-2016-7425

DSA: 3696

IAVA: 2016-A-0306