aboutsummaryrefslogtreecommitdiffstats
path: root/english
diff options
context:
space:
mode:
authorKåre Thor Olsen <kaare@nightcall.dk>2022-06-13 07:19:47 +0200
committerKåre Thor Olsen <kaare@nightcall.dk>2022-06-13 07:19:47 +0200
commit8fc0673183e835eae3f1c0b7192e6fbc75fc5ec4 (patch)
treea383516b2638f7ccd383db33a33ccd9e32d9b248 /english
parent51c6ee35701e82cd6b12983b70253b0af2cef89d (diff)
[SECURITY] [DSA 5161-1] linux security update
Diffstat (limited to 'english')
-rw-r--r--english/security/2022/dsa-5161.data13
-rw-r--r--english/security/2022/dsa-5161.wml88
2 files changed, 101 insertions, 0 deletions
diff --git a/english/security/2022/dsa-5161.data b/english/security/2022/dsa-5161.data
new file mode 100644
index 00000000000..5385c2a355a
--- /dev/null
+++ b/english/security/2022/dsa-5161.data
@@ -0,0 +1,13 @@
+<define-tag pagetitle>DSA-5161-1 linux</define-tag>
+<define-tag report_date>2022-6-11</define-tag>
+<define-tag secrefs>CVE-2022-0494 CVE-2022-0854 CVE-2022-1012 CVE-2022-1729 CVE-2022-1786 CVE-2022-1789 CVE-2022-1852 CVE-2022-1966 CVE-2022-1972 CVE-2022-1974 CVE-2022-1975 CVE-2022-21499 CVE-2022-28893</define-tag>
+<define-tag packages>linux</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
+
+
+</dl>
diff --git a/english/security/2022/dsa-5161.wml b/english/security/2022/dsa-5161.wml
new file mode 100644
index 00000000000..7b221eedb89
--- /dev/null
+++ b/english/security/2022/dsa-5161.wml
@@ -0,0 +1,88 @@
+<define-tag description>security update</define-tag>
+<define-tag moreinfo>
+<p>Several vulnerabilities have been discovered in the Linux kernel that
+may lead to a privilege escalation, denial of service or information
+leaks.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0494">CVE-2022-0494</a>
+
+ <p>The scsi_ioctl() was susceptible to an information leak only
+ exploitable by users with CAP_SYS_ADMIN or CAP_SYS_RAWIO
+ capabilities.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0854">CVE-2022-0854</a>
+
+ <p>Ali Haider discovered a potential information leak in the DMA
+ subsystem. On systems where the swiotlb feature is needed, this
+ might allow a local user to read sensitive information.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1012">CVE-2022-1012</a>
+
+ <p>The randomisation when calculating port offsets in the IP
+ implementation was enhanced.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1729">CVE-2022-1729</a>
+
+ <p>Norbert Slusarek discovered a race condition in the perf subsystem
+ which could result in local privilege escalation to root. The
+ default settings in Debian prevent exploitation unless more
+ permissive settings have been applied in the
+ kernel.perf_event_paranoid sysctl.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1786">CVE-2022-1786</a>
+
+ <p>Kyle Zeng discovered a use-after-free in the io_uring subsystem
+ which way result in local privilege escalation to root.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1789">CVE-2022-1789</a> /
+ <a href="https://security-tracker.debian.org/tracker/CVE-2022-1852">CVE-2022-1852</a>
+
+ <p>Yongkang Jia, Gaoning Pan and Qiuhao Li discovered two NULL pointer
+ dereferences in KVM's CPU instruction handling, resulting in denial
+ of service.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1966">CVE-2022-1966</a>
+
+ <p>Aaron Adams discovered a use-after-free in Netfilter which may
+ result in local privilege escalation to root.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1972">CVE-2022-1972</a>
+
+ <p>Ziming Zhang discovered an out-of-bound write in Netfilter which may
+ result in local privilege escalation to root.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1974">CVE-2022-1974</a> /
+ <a href="https://security-tracker.debian.org/tracker/CVE-2022-1975">CVE-2022-1975</a>
+
+ <p>Duoming Zhou discovered that the NFC netlink interface was
+ suspectible to denial of service.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21499">CVE-2022-21499</a>
+
+ <p>It was discovered that the kernel debugger could be used to bypass
+ UEFI Secure Boot restrictions.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28893">CVE-2022-28893</a>
+
+ <p>Felix Fu discovered a use-after-free in the implementation of the
+ Remote Procedure Call (SunRPC) protocol, which could in denial of
+ service or an information leak.</p></li>
+
+</ul>
+
+<p>For the stable distribution (bullseye), these problems have been fixed in
+version 5.10.120-1.</p>
+
+<p>We recommend that you upgrade your linux packages.</p>
+
+<p>For the detailed security status of linux please refer to its security
+tracker page at:
+<a href="https://security-tracker.debian.org/tracker/linux">\
+https://security-tracker.debian.org/tracker/linux</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2022/dsa-5161.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy