Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2021.0175
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2021-0175)
Zusammenfassung:The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2021-0175 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2021-0175 advisory.

Vulnerability Insight:
This kernel-linus update is based on upstream 5.10.27 and fixes at least
the following security issues:

The fix for XSA-365 includes initialization of pointers such that
subsequent cleanup code wouldn't use uninitialized or stale values.
This initialization went too far and may under certain conditions also
overwrite pointers which are in need of cleaning up. The lack of
cleanup would result in leaking persistent grants. The leak in turn
would prevent fully cleaning up after a respective guest has died,
leaving around zombie domains. A malicious or buggy frontend driver
may be able to cause resource leaks from the corresponding backend
driver. This can result in a host-wide Denial of Service (DoS).
(CVE-2021-28688 / XSA-371).

An issue was discovered in fs/io_uring.c in the Linux kernel through
5.11.8. It allows attackers to cause a denial of service (deadlock)
because exit may be waiting to park a SQPOLL thread, but concurrently
that SQPOLL thread is waiting for a signal to start (CVE-2021-28951).

A race condition was discovered in get_old_root in fs/btrfs/ctree.c in
the Linux kernel through 5.11.8. It allows attackers to cause a denial
of service (BUG) because of a lack of locking on an extent buffer
before a cloning operation (CVE-2021-28964).

In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux
kernel through 5.11.8 on some Haswell CPUs, userspace applications (such
as perf-fuzzer) can cause a system crash because the PEBS status in a
PEBS record is mishandled (CVE-2021-28971).

In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8,
the RPA PCI Hotplug driver has a user-tolerable buffer overflow when
writing a new device name to the driver from userspace, allowing userspace
to write data to the kernel stack frame directly. This occurs because
add_slot_store and remove_slot_store mishandle drc_name '\0' termination
(CVE-2021-28972).

An issue was discovered in the Linux kernel before 5.11.9. drivers/vhost/
vdpa.c has a use-after-free because v->config_ctx has an invalid value
upon re-opening a character device (CVE-2021-29266).

It also adds the following fixes:
- arm: enable OF_OVERLAY (mga#28596)

For other upstream fixes, see the referenced changelogs.

Affected Software/OS:
'kernel-linus' package(s) on Mageia 7, Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-28688
https://xenbits.xenproject.org/xsa/advisory-371.txt
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-28951
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3ebba796fa251d042be42b929a2d916ee5c34a49
Common Vulnerability Exposure (CVE) ID: CVE-2021-28964
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
Common Vulnerability Exposure (CVE) ID: CVE-2021-28971
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea
Common Vulnerability Exposure (CVE) ID: CVE-2021-28972
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678
Common Vulnerability Exposure (CVE) ID: CVE-2021-29266
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.9
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f6bbf0010ba004f5e90c7aefdebc0ee4bd3283b9
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.