Debian 安全警報
DSA-4843-1 linux -- 安全更新
- 報告日期:
- 2021/02/01
- 受影響的軟件:
- linux
- 可被襲擊:
- 是
- 參考的安全性資料庫:
- 在 Debian 臭蟲追蹤系統中: 臭蟲 970736, 臭蟲 972345, 臭蟲 977048, 臭蟲 977615.
在 Mitre's CVE 的目錄中: CVE-2020-27815, CVE-2020-27825, CVE-2020-27830, CVE-2020-28374, CVE-2020-29568, CVE-2020-29569, CVE-2020-29660, CVE-2020-29661, CVE-2020-36158, CVE-2021-3347, CVE-2021-20177. - 更詳盡的資訊:
-
Linux核心中發現了幾個可能導致權限提升、拒絕服務或信息泄漏的漏洞。
- CVE-2020-27815
A flaw was reported in the JFS filesystem code allowing a local attacker with the ability to set extended attributes to cause a denial of service。
- CVE-2020-27825
Adam
pi3
Zabrocki reported a use-after-free flaw in the ftrace ring buffer resizing logic due to a race condition, which could result in denial of service or information leak。 - CVE-2020-27830
Shisong Qin reported a NULL pointer dereference flaw in the Speakup screen reader core driver。
- CVE-2020-28374
David Disseldorp discovered that the LIO SCSI target implementation performed insufficient checking in certain XCOPY requests. An attacker with access to a LUN and knowledge of Unit Serial Number assignments can take advantage of this flaw to read and write to any LIO backstore, regardless of the SCSI transport settings。
- CVE-2020-29568 (XSA-349)
Michael Kurth and Pawel Wieczorkiewicz reported that frontends can trigger OOM in backends by updating a watched path。
- CVE-2020-29569 (XSA-350)
Olivier Benjamin and Pawel Wieczorkiewicz reported a use-after-free flaw which can be triggered by a block frontend in Linux blkback. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend。
- CVE-2020-29660
Jann Horn reported a locking inconsistency issue in the tty subsystem which may allow a local attacker to mount a read-after-free attack against TIOCGSID。
- CVE-2020-29661
Jann Horn reported a locking issue in the tty subsystem which can result in a use-after-free. A local attacker can take advantage of this flaw for memory corruption or privilege escalation。
- CVE-2020-36158
A buffer overflow flaw was discovered in the mwifiex WiFi driver which could result in denial of service or the execution of arbitrary code via a long SSID value。
- CVE-2021-3347
It was discovered that PI futexes have a kernel stack use-after-free during fault handling. An unprivileged user could use this flaw to crash the kernel (resulting in denial of service) or for privilege escalation。
- CVE-2021-20177
A flaw was discovered in the Linux implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) can take advantage of this flaw to cause a kernel panic when inserting iptables rules。
在穩定版(buster)中,此問題已被修復於版本 4.19.171-2。
我們建議您升級您的 linux 套件。
查看關於 linux 的詳細信息,請訪問其安全追蹤頁面 https://security-tracker.debian.org/tracker/linux。
- CVE-2020-27815