de Redes ▼
|ID de Prueba:||188.8.131.52.4.1.256184.108.40.2062689|
|Categoría:||Debian Local Security Checks|
|Título:||Debian LTS: Security Advisory for linux (DLA-2689-1)|
|Resumen:||The remote host is missing an update for the 'linux'; package(s) announced via the DLA-2689-1 advisory.|
The remote host is missing an update for the 'linux'
package(s) announced via the DLA-2689-1 advisory.
Several vulnerabilities have been discovered in the Linux kernel that
may lead to the execution of arbitrary code, privilege escalation,
denial of service, or information leaks.
This update is not yet available for the armel (ARM EABI soft-float)
CVE-2020-24586, CVE-2020-24587, CVE-2020-26147
Mathy Vanhoef discovered that many Wi-Fi implementations,
including Linux's mac80211, did not correctly implement reassembly
of fragmented packets. In some circumstances, an attacker within
range of a network could exploit these flaws to forge arbitrary
packets and/or to access sensitive data on that network.
Mathy Vanhoef discovered that most Wi-Fi implementations,
including Linux's mac80211, did not authenticate the 'is
aggregated' packet header flag. An attacker within range of a
network could exploit this to forge arbitrary packets on that
CVE-2020-25670, CVE-2020-25671, CVE-2021-23134
kiyin of TenCent discovered several reference counting bugs
in the NFC LLCP implementation which could lead to use-after-free.
A local user could exploit these for denial of service (crash or
memory corruption) or possibly for privilege escalation.
Nadav Markus and Or Cohen of Palo Alto Networks discovered that
the original fixes for these introduced a new bug that could
result in use-after-free and double-free. This has also been
kiyin of TenCent discovered a memory leak in the NFC LLCP
implementation. A local user could exploit this for denial of
service (memory exhaustion).
Mathy Vanhoef discovered that a bug in some Wi-Fi implementations,
including Linux's mac80211. When operating in AP mode, they would
forward EAPOL frames from one client to another while the sender
was not yet authenticated. An attacker within range of a network
could use this for denial of service or as an aid to exploiting
Researchers at ANSSI discovered vulnerabilities in the Bluetooth
Passkey authentication method, and in Linux's implementation of
it. An attacker within range of two Bluetooth devices while they
pair using Passkey authentication could exploit this to obtain the
shared secret (Passkey) and then impersonate either of the devices
to each other.
Jann Horn of Google reported a flaw in Linux's virtual memory
management. A parent and child process initially share all their
memory, but when either writes to a shared page, the page is
duplicated and unshared (copy-on-write). However, in case an
operation such as vmsplice() required the kernel to take an
additional reference to a shared page, and a ...
Description truncated. Please see the references for more information.
'linux' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
4.9.272-1. This update additionally includes many more bug fixes from
stable updates 4.9.259-4.9.272 inclusive.
We recommend that you upgrade your linux packages.
Common Vulnerability Exposure (CVE) ID: CVE-2021-0129|
Common Vulnerability Exposure (CVE) ID: CVE-2021-3428
Common Vulnerability Exposure (CVE) ID: CVE-2021-3483
Common Vulnerability Exposure (CVE) ID: CVE-2021-3564
Common Vulnerability Exposure (CVE) ID: CVE-2021-3573
Common Vulnerability Exposure (CVE) ID: CVE-2021-3587
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|Esta es sólo una de 97459 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.|
Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.