Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2021.0030
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2021-0030)
Zusammenfassung:The remote host is missing an update for the 'aufs-tools, kernel, kmod-virtualbox, kmod-xtables-addons, xtables-addons' package(s) announced via the MGASA-2021-0030 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'aufs-tools, kernel, kmod-virtualbox, kmod-xtables-addons, xtables-addons' package(s) announced via the MGASA-2021-0030 advisory.

Vulnerability Insight:
This update provides an upgrade to the new upstream 5.10 longterm branch,
currently based on 5.10.6, adding new features and new and improved
hardware support.

This update also fixes at least the following security issues:

In binder_release_work of binder.c, there is a possible use-after-free due
to improper locking. This could lead to local escalation of privilege in
the kernel with no additional execution privileges needed. User interaction
is not needed for exploitation (CVE-2020-0423).

In various methods of hid-multitouch.c, there is a possible out of bounds
write due to a missing bounds check. This could lead to local escalation of
privilege with no additional execution privileges needed. User interaction
is not needed for exploitation (CVE-2020-0465).

Insufficient access control in the Linux kernel driver for some Intel(R)
Processors may allow an authenticated user to potentially enable information
disclosure via local access (CVE-2020-8694).

A potential vulnerability in the AMD extension to Linux 'hwmon' service may
allow an attacker to use the Linux-based Running Average Power Limit (RAPL)
interface to show various side channel attacks. In line with industry
partners, AMD has updated the RAPL interface to require privileged access
(CVE-2020-12912).

A use-after-free memory flaw was found in the perf subsystem allowing a
local attacker with permission to monitor perf events to corrupt memory and
possibly escalate privileges. The highest threat from this vulnerability
is to data confidentiality and integrity as well as system availability
(CVE-2020-14351).

A use-after-free was found in the way the console subsystem was using ioctls
KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read
memory access out of bounds. The highest threat from this vulnerability is
to data confidentiality (CVE-2020-25656).

Linux kernel concurrency use-after-free in vt (CVE-2020-25668).

Linux Kernel use-after-free in sunkbd_reinit (CVE-2020-25669).

A flaw memory leak in the Linux kernel performance monitoring subsystem was
found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use
this flaw to starve the resources causing denial of service (CVE-2020-25704).

A flaw in the way reply ICMP packets are limited in the Linux kernel
functionality was found that allows to quickly scan open UDP ports. This
flaw allows an off-path remote user to effectively bypassing source port UDP
randomization. The highest threat from this vulnerability is to
confidentiality and possibly integrity, because software that relies on UDP
source port randomization are indirectly affected as well (CVE-2020-25705).

An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c
in the Linux kernel before 5.9.2. It has an infinite loop related to
improper interaction between a resampler and edge triggering (CVE-2020-27152).

An issue was discovered in the Linux kernel ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'aufs-tools, kernel, kmod-virtualbox, kmod-xtables-addons, xtables-addons' package(s) on Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-0423
https://source.android.com/security/bulletin/2020-10-01
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-0465
https://source.android.com/security/bulletin/2020-12-01
Common Vulnerability Exposure (CVE) ID: CVE-2020-12912
https://www.amd.com/en/corporate/product-security
Common Vulnerability Exposure (CVE) ID: CVE-2020-14351
https://bugzilla.redhat.com/show_bug.cgi?id=1862849
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25656
https://www.starwindsoftware.com/security/sw-20210325-0006/
https://bugzilla.redhat.com/show_bug.cgi?id=1888726
https://lkml.org/lkml/2020/10/16/84
https://lkml.org/lkml/2020/10/29/528
Common Vulnerability Exposure (CVE) ID: CVE-2020-25668
https://bugzilla.redhat.com/show_bug.cgi?id=1893287,
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=90bfdeef83f1d6c696039b6a917190dcbbad3220
https://www.openwall.com/lists/oss-security/2020/10/30/1,
https://www.openwall.com/lists/oss-security/2020/11/04/3,
http://www.openwall.com/lists/oss-security/2020/10/30/1
http://www.openwall.com/lists/oss-security/2020/11/04/3
Common Vulnerability Exposure (CVE) ID: CVE-2020-25669
https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
https://www.openwall.com/lists/oss-security/2020/11/05/2,
https://www.openwall.com/lists/oss-security/2020/11/20/5,
http://www.openwall.com/lists/oss-security/2020/11/05/2
http://www.openwall.com/lists/oss-security/2020/11/20/5
Common Vulnerability Exposure (CVE) ID: CVE-2020-25704
https://www.starwindsoftware.com/security/sw-20220802-0003/
https://bugzilla.redhat.com/show_bug.cgi?id=1895961
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00
https://www.openwall.com/lists/oss-security/2020/11/09/1
Common Vulnerability Exposure (CVE) ID: CVE-2020-25705
https://us-cert.cisa.gov/ics/advisories/icsa-21-131-03
Common Vulnerability Exposure (CVE) ID: CVE-2020-27152
https://bugzilla.kernel.org/show_bug.cgi?id=208767
http://www.openwall.com/lists/oss-security/2020/11/03/1
Common Vulnerability Exposure (CVE) ID: CVE-2020-27194
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
https://github.com/torvalds/linux/commit/5b9fbeb75b6a98955f628e205ac26689bcb1383e
Common Vulnerability Exposure (CVE) ID: CVE-2020-27673
https://security.gentoo.org/glsa/202011-06
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e99502f76271d6bc4e374fe368c50c67a1fd3070
https://github.com/torvalds/linux/commit/e99502f76271d6bc4e374fe368c50c67a1fd3070
https://xenbits.xen.org/xsa/advisory-332.html
http://www.openwall.com/lists/oss-security/2021/01/19/6
SuSE Security Announcement: openSUSE-SU-2020:1783 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
SuSE Security Announcement: openSUSE-SU-2020:1844 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-27675
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6USZ4APZSBQDHGJLJMHW5JBN4QZV6SKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZG6TZLD23QO3PV2AN2HB625ZX47ALTT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNF2R7FUT4IOJ2RIRGQ7X5R4F4FVVLSR/
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073d0552ead5bfc7a3a9c01de590e924f11b5dd2
https://github.com/torvalds/linux/commit/073d0552ead5bfc7a3a9c01de590e924f11b5dd2
https://xenbits.xen.org/xsa/advisory-331.html
http://www.openwall.com/lists/oss-security/2021/01/19/3
Common Vulnerability Exposure (CVE) ID: CVE-2020-27825
Debian Security Information: DSA-4843 (Google Search)
https://www.debian.org/security/2021/dsa-4843
https://bugzilla.redhat.com/show_bug.cgi?id=1905155
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-27830
https://bugzilla.redhat.com/show_bug.cgi?id=1919900
http://www.openwall.com/lists/oss-security/2020/12/08/1
http://www.openwall.com/lists/oss-security/2020/12/08/4
Common Vulnerability Exposure (CVE) ID: CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
Common Vulnerability Exposure (CVE) ID: CVE-2020-28588
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211
Common Vulnerability Exposure (CVE) ID: CVE-2020-28915
https://bugzilla.suse.com/show_bug.cgi?id=1178886
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16
https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd
Common Vulnerability Exposure (CVE) ID: CVE-2020-28941
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d4122754442799187d5d537a9c039a49a67e57f1
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linus&id=d4122754442799187d5d537a9c039a49a67e57f1
https://github.com/torvalds/linux/commit/d4122754442799187d5d537a9c039a49a67e57f1
https://www.openwall.com/lists/oss-security/2020/11/19/3
http://www.openwall.com/lists/oss-security/2020/11/19/5
Common Vulnerability Exposure (CVE) ID: CVE-2020-28974
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
https://seclists.org/oss-sec/2020/q4/104
http://www.openwall.com/lists/oss-security/2020/11/25/1
Common Vulnerability Exposure (CVE) ID: CVE-2020-29534
https://bugs.chromium.org/p/project-zero/issues/detail?id=2089
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f2122045b946241a9e549c2a76cea54fa58a7ff
Common Vulnerability Exposure (CVE) ID: CVE-2020-29660
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
http://www.openwall.com/lists/oss-security/2020/12/10/1
Common Vulnerability Exposure (CVE) ID: CVE-2020-29661
https://security.netapp.com/advisory/ntap-20210122-0001/
http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc
https://www.oracle.com/security-alerts/cpuoct2021.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-8694
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.