blob: 50514e0b8ea3625ad8a0669bd02c79961c8bb81e (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
|
To: debian-security-announce@lists.debian.org
Subject: [SECURITY] [DSA EMBRGD-1] linux security update
-------------------------------------------------------------------------
Debian Security Advisory DSA-EMBRGD-1 security@debian.org
https://www.debian.org/security/
June 09, 2020 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2019-3016 CVE-2019-19462 CVE-2020-0543 CVE-2020-10711
CVE-2020-10732 CVE-2020-10751 CVE-2020-10757 CVE-2020-12114
CVE-2020-12464 CVE-2020-12768 CVE-2020-12770 CVE-2020-13143
Debian Bug : 960271
CVE-2019-3016
It was discovered that the KVM implementation for x86 did not
always perform TLB flushes when needed, if the paravirtualised
TLB flush feature was enabled. This could lead to disclosure of
sensitive information within a guest VM.
CVE-2019-19462
The syzkaller tool found a missing error check in the 'relay'
library used to implement various files under debugfs. A local
user permitted to access debugfs could use this to cause a denial
of service (crash) or possibly for privilege escalation.
CVE-2020-0543
Description
CVE-2020-10711
Description
CVE-2020-10732
Description
CVE-2020-10751
Description
CVE-2020-10757
Description
CVE-2020-12114
Description
CVE-2020-12464
Description
CVE-2020-12768
Description
CVE-2020-12770
Description
CVE-2020-13143
Description
For the stable distribution (buster), these problems have been fixed in
version 4.19.118-2+deb10u1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
|