Menü Schließen

Linux Kernel Security Update DSA-5050-1

Logo debian

In den Linux Distributionen gibt es einige Sicherheitsupdates. 7 Sicherheitslücken und 2 Bugs werden im DSA-5050-1 unter Debian behoben.

Debian Security Update DSA-5050-1 Release Notes

Security database references:In the Debian bugtracking system: Bug 988044Bug 996974.
In Mitre’s CVE dictionary: CVE-2021-4155CVE-2021-28711CVE-2021-28712CVE-2021-28713CVE-2021-28714CVE-2021-28715CVE-2021-39685CVE-2021-45095CVE-2021-45469CVE-2021-45480CVE-2022-0185CVE-2022-23222.
More information:

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

  • CVE-2021-4155Kirill Tkhai discovered a data leak in the way the XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for a size increase of files with unaligned size. A local attacker can take advantage of this flaw to leak data on the XFS filesystem.
  • CVE-2021-28711CVE-2021-28712CVE-2021-28713 (XSA-391)Juergen Gross reported that malicious PV backends can cause a denial of service to guests being serviced by those backends via high frequency events, even if those backends are running in a less privileged environment.
  • CVE-2021-28714CVE-2021-28715 (XSA-392)Juergen Gross discovered that Xen guests can force the Linux netback driver to hog large amounts of kernel memory, resulting in denial of service.
  • CVE-2021-39685 Szymon Heidrich discovered a buffer overflow vulnerability in the USB gadget subsystem, resulting in information disclosure, denial of service or privilege escalation.
  • CVE-2021-45095 It was discovered that the Phone Network protocol (PhoNet) driver has a reference count leak in the pep_sock_accept() function.
  • CVE-2021-45469 Wenqing Liu reported an out-of-bounds memory access in the f2fs implementation if an inode has an invalid last xattr entry. An attacker able to mount a specially crafted image can take advantage of this flaw for denial of service.
  • CVE-2021-45480 A memory leak flaw was discovered in the __rds_conn_create() function in the RDS (Reliable Datagram Sockets) protocol subsystem.
  • CVE-2022-0185 William Liu, Jamie Hill-Daniel, Isaac Badipe, Alec Petridis, Hrvoje Misetic and Philip Papurt discovered a heap-based buffer overflow flaw in the legacy_parse_param function in the Filesystem Context functionality, allowing an local user (with CAP_SYS_ADMIN capability in the current namespace) to escalate privileges.
  • CVE-2022-23222 tr3e discovered that the BPF verifier does not properly restrict several *_OR_NULL pointer types allowing these types to do pointer arithmetic. A local user with the ability to call bpf(), can take advantage of this flaw to excalate privileges. Unprivileged calls to bpf() are disabled by default in Debian, mitigating this flaw.

For the stable distribution (bullseye), these problems have been fixed in version 5.10.92-1. This version includes changes which were aimed to land in the next Debian bullseye point release.

Quelle: Debian — Security Information — DSA-5050-1 linux

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert