blob: 8bd7745285a023e63d44287f37ac045343dd90b9 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
|
#use wml::debian::translation-check translation="863617956faa110c23c49633b5ebc788b82e3065" mindelta="1"
<define-tag description>sikkerhedsopdatering</define-tag>
<define-tag moreinfo>
<p>Flere sårbarheder have been discovered in the Linux kernel that
may lead to a denial of service or rettighedsforøgelse:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3534">CVE-2014-3534</a>
<p>Martin Schwidefsky of IBM discovered that the ptrace subsystem does
not properly sanitize the psw mask value. On s390 systems, an
unprivileged local user could use this flaw to set address space
control bits to kernel space combination and thus gain read/write
access to kernel memory.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4667">CVE-2014-4667</a>
<p>Gopal Reddy Kodudula of Nokia Siemens Networks discovered that the
sctp_association_free function does not properly manage a certain
backlog value, which allows remote attackers to cause a denial of
service (socket outage) via a crafted SCTP packet.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4943">CVE-2014-4943</a>
<p>Sasha Levin discovered a flaw in the Linux kernel's point-to-point
protocol (PPP) when used with the Layer Two Tunneling Protocol
(L2TP). An unprivileged local user could use this flaw for privilege
escalation.</p></li>
</ul>
<p>I den stabile distribution (wheezy), er disse problemer rettet i
version 3.2.60-1+deb7u3.</p>
<p>I den ustabile distribution (sid), er disse problemer rettet i
version 3.14.13-2.</p>
<p>Vi anbefaler at du opgraderer dine linux-pakker.</p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2014/dsa-2992.data"
|