[SECURITY] [DSA 5480-1] linux security update
Debian Security Advisory DSA-5480-1 firstname.lastname@example.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 18, 2023 https://www.debian.org/security/faq
Package : linux
CVE ID : CVE-2022-4269 CVE-2022-39189 CVE-2023-1206 CVE-2023-1380
CVE-2023-2002 CVE-2023-2007 CVE-2023-2124 CVE-2023-2269
CVE-2023-2898 CVE-2023-3090 CVE-2023-3111 CVE-2023-3212
CVE-2023-3268 CVE-2023-3338 CVE-2023-3389 CVE-2023-3609
CVE-2023-3611 CVE-2023-3776 CVE-2023-3863 CVE-2023-4004
CVE-2023-4128 CVE-2023-4132 CVE-2023-4147 CVE-2023-4194
CVE-2023-4273 CVE-2023-20588 CVE-2023-21255 CVE-2023-21400
CVE-2023-31084 CVE-2023-34319 CVE-2023-35788 CVE-2023-40283
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
William Zhao discovered that a flaw in the Traffic Control (TC)
subsystem when using a specific networking configuration
(redirecting egress packets to ingress using TC action "mirred"),
may allow a local unprivileged user to cause a denial of service
(triggering a CPU soft lockup).
Jann Horn discovered that TLB flush operations are mishandled in the
KVM subsystem in certain KVM_VCPU_PREEMPTED situations, which may
allow an unprivileged guest user to compromise the guest kernel.
It was discovered that the networking stack permits attackers to
force hash collisions in the IPv6 connection lookup table, which may
result in denial of service (significant increase in the cost of
lookups, increased CPU utilization).
Jisoo Jang reported a heap out-of-bounds read in the brcmfmac Wi-Fi
driver. On systems using this driver, a local user could exploit
this to read sensitive information or to cause a denial of service.
Ruiahn Li reported an incorrect permissions check in the Bluetooth
subsystem. A local user could exploit this to reconfigure local
Bluetooth interfaces, resulting in information leaks, spoofing, or
denial of service (loss of connection).
Lucas Leong and Reno Robert discovered a time-of-check-to-time-of-
use flaw in the dpt_i2o SCSI controller driver. A local user with
access to a SCSI device using this driver could exploit this for
This flaw has been mitigated by removing support for the I2OUSRCMD
Kyle Zeng, Akshay Ajayan and Fish Wang discovered that missing
metadata validation may result in denial of service or potential
privilege escalation if a corrupted XFS disk image is mounted.
Zheng Zhang reported that improper handling of locking in the device
mapper implementation may result in denial of service.
It was discovered that missing sanitising in the f2fs file
system may result in denial of service if a malformed file
system is accessed.
It was discovered that missing initialization in ipvlan networking
may lead to an out-of-bounds write vulnerability, resulting in
denial of service or potentially the execution of arbitrary code.
The TOTE Robot tool found a flaw in the Btrfs filesystem driver that
can lead to a use-after-free. It's unclear whether an unprivileged
user can exploit this.
Yang Lan that missing validation in the GFS2 filesystem could result
in denial of service via a NULL pointer dereference when mounting a
malformed GFS2 filesystem.
It was discovered that an out-of-bounds memory access in relayfs
could result in denial of service or an information leak.
Davide Ornaghi discovered a flaw in the DECnet protocol
implementation which could lead to a null pointer dereference or
use-after-free. A local user can exploit this to cause a denial of service
(crash or memory corruption) and probably for privilege escalation.
This flaw has been mitigated by removing the DECnet protocol
Querijn Voet discovered a use-after-free in the io_uring subsystem,
which may result in denial of service or privilege escalation.
It was discovered that an out-of-bounds write in the traffic control
subsystem for the Quick Fair Queueing scheduler (QFQ) may result in
denial of service or privilege escalation.
CVE-2023-3609 / CVE-2023-3776 / CVE-2023-4128
It was discovered that a use-after-free in the cls_fw, cls_u32,
cls_route and network classifiers may result in denial of service or
potential local privilege escalation.
It was discovered that a use-after-free in the NFC implementation
may result in denial of service, an information leak or potential
local privilege escalation.
It was discovered that a use-after-free in Netfilter's
implementation of PIPAPO (PIle PAcket POlicies) may result in denial
of service or potential local privilege escalation for a user with
the CAP_NET_ADMIN capability in any user or network namespace.
A use-after-free in the driver for Siano SMS1xxx based MDTV
receivers may result in local denial of service.
Kevin Rich discovered a use-after-free in Netfilter when adding a
rule with NFTA_RULE_CHAIN_ID, which may result in local privilege
escalation for a user with the CAP_NET_ADMIN capability in any user
or network namespace.
A type confusion in the implementation of TUN/TAP network devices
may allow a local user to bypass network filters.
Maxim Suhanov discovered a stack overflow in the exFAT driver, which
may result in local denial of service via a malformed file system.
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Koepf and
Oleksii Oleksenko discovered that on some AMD CPUs with the Zen1
micro architecture an integer division by zero may leave stale
quotient data from a previous division, resulting in a potential
leak of sensitive data.
A use-after-free was discovered in the in the Android binder driver,
which may result in local privilege escalation on systems where the
binder driver is loaded.
Ye Zhang and Nicolas Wu discovered a double-free in the io_uring
subsystem, which may result in denial of service or privilege
It was discovered that the DVB Core driver does not properly handle
locking of certain events, allowing a local user to cause a denial
Ross Lagerwall discovered a buffer overrun in Xen's netback driver
which may allow a Xen guest to cause denial of service to the
virtualisation host my sending malformed packets.
Hangyu Hua that an off-by-one in the Flower traffic classifier may
result in local of service or the execution of privilege escalation.
A use-after-free was discovered in Bluetooth L2CAP socket handling.
For the oldstable distribution (bullseye), these problems have been fixed
in version 5.10.191-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security
tracker page at:
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
A linux security update has been released for Debian GNU/Linux 11 to address several vulnerabilities.