Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2021.0508
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2021-0508)
Resumen:The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2021-0508 advisory.
Descripción:Summary:
The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2021-0508 advisory.

Vulnerability Insight:
This kernel-linus update is based on upstream 5.10.78 and fixes at least
the following security issues:

A use-after-free vulnerability in the NFC stack can lead to a threat to
confidentiality, integrity, and system availability (CVE-2021-3760).

A flaw in the SCTP stack where a blind attacker may be able to kill an
existing SCTP association through invalid chunks if the attacker knows
the IP-addresses and port numbers being used and the attacker can send
packets with spoofed IP addresses (CVE-2021-3772).

A flaw heap buffer overflow in the Linux kernel's AMD Radeon graphics
card driver was found in the way user writes some malicious data to the
AMD GPU Display Driver Debug Filesystem (to the VGA sub-directory of the
/sys/kernel/debug/ directory). A local user could use this flaw to crash
the system or escalate their privileges on the system (CVE-2021-42327).

The firewire subsystem in the Linux kernel through 5.14.13 has a buffer
overflow related to drivers/media/firewire/firedtv-avc.c and
drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles
bounds checking (CVE-2021-42739).

A flaw was discovered in the cryptographic receive code in the Linux
kernel's implementation of transparent interprocess communication. An
attacker, with the ability to send TIPC messages to the target, can
corrupt memory and escalate privileges on the target system
(CVE-2021-43267).

An issue was discovered in the Linux kernel before 5.14.15. There is an
array-index-out-of-bounds flaw in the detach_capi_ctr function in
drivers/isdn/capi/kcapi.c (CVE-2021-43389).

For other upstream fixes, see the referenced changelogs.

Affected Software/OS:
'kernel-linus' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-3760
Debian Security Information: DSA-5096 (Google Search)
https://www.debian.org/security/2022/dsa-5096
https://bugzilla.redhat.com/show_bug.cgi?id=2000585
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-3772
DSA-5096
[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://security.netapp.com/advisory/ntap-20221007-0001/
https://ubuntu.com/security/CVE-2021-3772
https://www.oracle.com/security-alerts/cpujul2022.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-42327
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c
https://www.mail-archive.com/amd-gfx@lists.freedesktop.org/msg69080.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://seclists.org/oss-sec/2021/q2/46
https://www.starwindsoftware.com/security/sw-20220804-0001/
https://bugzilla.redhat.com/show_bug.cgi?id=1951739
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
Common Vulnerability Exposure (CVE) ID: CVE-2021-43267
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
http://www.openwall.com/lists/oss-security/2022/02/10/1
Common Vulnerability Exposure (CVE) ID: CVE-2021-43389
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
http://www.openwall.com/lists/oss-security/2021/11/05/1
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.