Friday, May 21, 2021

Debian: CVE-2021-30511: chromium -- security update

Description
In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.
Solution(s)
  • amazon-linux-ami-2-upgrade-kernel
  • amazon-linux-ami-2-upgrade-kernel-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64
  • amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64
  • amazon-linux-ami-2-upgrade-kernel-devel
  • amazon-linux-ami-2-upgrade-kernel-headers
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-228
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-228-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-229
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-229-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-253
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-253-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-254
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-254-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-181-140-257
  • amazon-linux-ami-2-upgrade-kernel-tools
  • amazon-linux-ami-2-upgrade-kernel-tools-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-tools-devel
  • amazon-linux-ami-2-upgrade-perf
  • amazon-linux-ami-2-upgrade-perf-debuginfo
  • amazon-linux-ami-2-upgrade-python-perf
  • amazon-linux-ami-2-upgrade-python-perf-debuginfo


  • References
     

    Copyright © 2020 Cyber Details - Vulnerability Database™

    Thanks for everything Templateism - You should have written the code a little more complicated