[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4941-1 linux -- linux

ID: oval:org.secpod.oval:def:605580Date: (C)2021-07-21   (M)2024-04-17
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2020-36311 A flaw was discovered in the KVM subsystem for AMD CPUs, allowing an attacker to cause a denial of service by triggering destruction of a large SEV VM. CVE-2021-3609 Norbert Slusarek reported a race condition vulnerability in the CAN BCM networking protocol, allowing a local attacker to escalate privileges. CVE-2021-33909 The Qualys Research Labs discovered a size_t-to-int conversion vulnerability in the Linux kernel"s filesystem layer. An unprivileged local attacker able to create, mount, and then delete a deep directory structure whose total path length exceeds 1GB, can take advantage of this flaw for privilege escalation. Details can be found in the Qualys advisory at https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt CVE-2021-34693 Norbert Slusarek discovered an information leak in the CAN BCM networking protocol. A local attacker can take advantage of this flaw to obtain sensitive information from kernel stack memory.

Platform:
Debian 10.x
Product:
linux-image-4.19
linux-headers-4.19
hyperv-daemons
libcpupower-dev
libcpupower1
usbip
libbpf-dev
libbpf4.19
liblockdep-dev
liblockdep4.19
lockdep
linux-support-4.19
Reference:
DSA-4941-1
CVE-2020-36311
CVE-2021-3609
CVE-2021-33909
CVE-2021-34693
CVE    4
CVE-2021-33909
CVE-2021-3609
CVE-2021-34693
CVE-2020-36311
...

© SecPod Technologies