Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Linux News Today: Debian GNU/Linux Jessie, Wheezy and Sid Receive New Linux Kernel Updates

Posted on October 15, 2015

The Debian developers have announced that new kernel updates are now available for their Debian GNU/Linux 7.9 (Wheezy), Debian GNU/Linux 8.2 (Jessie), and Debian GNU/Linux Unstable (Sid) operating systems.

There are four critical kernel vulnerabilities (CVE-2015-2925, CVE-2015-5257, CVE-2015-5283, and CVE-2015-7613) that have been addressed in this update. The new kernel packages are 4.2.3-1 for Sid, 3.16.7-ckt11-1+deb8u5 for Jessie, and 3.2.68-1+deb7u5 for Wheezy.

All the Debian GNU/Linux operating systems that are part of the branches mentioned above are vulnerable, which means that users are urged to update their Debian-based machines as soon as possible using the built-in package management utilities.

“Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, unauthorised information disclosure or unauthorised information modification,” said the Debian developers in the DSA-3372-1 security advisory.

What has been fixed

The first security flaw was discovered by Jann Horn in the Linux kernel packages of Debian GNU/Linux 7 Wheezy. It could allow a privileged user with write permissions to access the entire file system when a subdirectory of the respective file system was bind-mounted into a mount namespace or chroot. This is fixed for Debian GNU/Linux 8 Jessie systems.

The second kernel vulnerability was discovered by Moein Ghasemzadeh from the Istuary Innovation Labs in the Linux kernel’s USB drivers, as an attacker could use a USB device to crash the system by causing a DoS (Denial of Service) attack by imitating a Whiteheat USB serial device.

The third one was discovered by Marcelo Ricardo Leitner in Debian GNU/Linux 8 Jessie’s Linux kernel SCTP support, which could allow an attacker to crash the system by causing a denial of service by creating multiple SCTP sockets.

Lastly, the fourth kernel vulnerability was discovered by Dmitry Vyukov in Linux kernel’s System V IPC implementation, which could allow a local user to gain root access, cause a denial of service, as well as to access or modify unauthorized information. This was possible because the System V IPC objects were made accessible before the initialization of the ownership and several other attributes.

Via Softpedia

Terbaru

  • Inilah Tahapan dan Syarat Pendaftaran Beasiswa Garuda 2026 Gelombang II (25 Mei – 25 Juni 2026)
  • Ini Maksud Soal Tugas Guru Non-ASN Berakhir 2027!
  • Apa Itu Siscamling? Inilah Cara Mengaktifkan Paket Anti Spam Telkomsel
  • Sah, Nilai TKA Jadi Salah Satu Komponen Seleksi Siswa SPMB Secara Nasional 2026
  • Inilah 3 Lagi Pinjol Ilegal Menurut OJK Tahun 2026
  • Cara Login Proktor Browser OSN Mode Online, Uji Coba OSN Semua Jenjang Terbaru
  • Inilah Link Web Komunikasi OSN 2026 anbk.kemendikdasmen.go.id/osnk ANBK Kemendikdasmen untuk Simulasi
  • Inilah Jadwal Pembagian Deviden BBRI 2026, Siap-siap!
  • Ini Alasan Kenapa Followers IG Berkurang Sendiri Mei 2026?
  • Panduan Download vhd-osnk-2025_fresh versi 29.25.5.0 untuk Uji Coba OSN-K SMA SMP Sederajat 2026
  • Iniloh Syarat dan Komponen Nilai Seleksi Siswa Unggul ITB Jalur Nilai Rapor 2026/2027
  • Inilah Syarat dan Prosedur Ikut Seleksi Siswa Unggul ITB Jalur Tes Tulis 2026/2027
  • Inilah Kronologi & Latar Belakang Kasus Erin Taulany vs ART Hera: Masalah Facebook Pro?
  • Inilah Alasan Kenapa Ending Film Children of Heaven diubah di Indonesia
  • Ini Alasan Hanny Kristianto Cabut Sertifikat Mualaf Richard Lee
  • Inilah Syarat Dokumen SSU ITB 2024-2026 yang Wajib Kalian Siapkan Supaya Nggak Gagal Seleksi Administrasi
  • Inilah Episyrphus Balteatus, Lalat Unik Penyamar yang Sangat Bermanfaat bagi Taman Kalian
  • Inilah Cara Lolos Seleksi Siswa Unggul ITB Lewat Jalur Tes Tulis Biar Jadi Mahasiswa Ganesha
  • Inilah Penemuan Fosil Hadrosaurus yang Ungkap Bahwa Penyakit Langka Manusia Sudah Ada Sejak Zaman Prasejarah
  • Inilah Penemuan Terbaru yang Mengungkap Bahwa Sunburn Ternyata Disebabkan Oleh Kerusakan RNA
  • Inilah Alasan Kenapa Manusia Lebih Sering Hamil Satu Bayi daripada Kembar Menurut Penelitian Terbaru
  • Inilah Syarat dan Cara Pendaftaran IMEI Internasional Mulai Mei 2026
  • Bocoran Spek Samsung Galaxy S27 Ultra Nih, Kamera 3X Hilang + Teknologi AI
  • Inilah Perbedaan Motorola G47 dan Motorola G45, Cuma Kamera 108 Megapiksel Doang?
  • Update Baru Google Gemini: Bisa Bikin File Word, PDF, Excel secara Otomatis
  • Rekomendasi Motor Listrik 2026 Anti Mogok!
  • Ini Loh Honda Vision 110, Motor Baru Seharga Beat & Rangka eSAF Khusus Pasar Eropa
  • Inilah Mobil-Mobil Paling Cocok Transisi ke Bioetanol E20 dan Biodiesel B50!
  • Inilah Ternyata Batas Minimal Daya Cas Mobil Listrik di Rumah
  • DJP Geser Batas Akhir Lapor Pajak Sampai 31 Mei 2026
  • How to build a high-performance private photo cloud with Immich and TrueNAS SCALE
  • How to Build an Endgame Local AI Agent Setup Using an 8-Node NVIDIA Cluster with 1TB Memory
  • How to Master Windows Event Logs to Level Up Your Cybersecurity Investigations and SOC Career
  • How to Build Ultra-Resilient Databases with Amazon Aurora Global Database and RDS Proxy for Maximum Uptime and Performance
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to create high-quality AI videos without wasting credits by using a professional storyboarding workflow
  • How to Use Google Remy and the New Wave of AI Agents to Automate Your Tasks 24/7
  • How to create a consistent AI influencer from scratch and build a high-value digital brand easily
  • Anthropic-SpaceX Deal Explained! 220K GPU & Orbital Compute
  • How to Setup Free Claude Code on Windows in 10 Minutes: A Complete No-Subscription Guide
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme