[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3446-1] linux-5.10 security update

Debian LTS Advisory DLA-3446-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                        Ben Hutchings
June 05, 2023                                 https://wiki.debian.org/LTS

Package        : linux-5.10
Version        : 5.10.179-1~deb10u1
CVE ID         : CVE-2023-0386 CVE-2023-31436 CVE-2023-32233
Debian Bug     : 1035779

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information


    It was discovered that under certain conditions the overlayfs
    filesystem implementation did not properly handle copy up
    operations. A local user permitted to mount overlay mounts in user
    namespaces can take advantage of this flaw for local privilege


    Gwangun Jung reported a a flaw causing heap out-of-bounds
    read/write errors in the traffic control subsystem for the Quick
    Fair Queueing scheduler (QFQ) which may result in information
    leak, denial of service or privilege escalation.


    Patryk Sondej and Piotr Krysiuk discovered a use-after-free flaw
    in the Netfilter nf_tables implementation when processing batch
    requests, which may result in local privilege escalation for a
    user with the CAP_NET_ADMIN capability in any user or network

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your linux-5.10 packages.

For the detailed security status of linux-5.10 please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature

Reply to: