Im Linux Kernel wurden ca. 10 Lücken entdeckt die zu einer Rechteausweitung führen können. Ein Update wird dringend empfohlen.
Debian Security Advisory DSA 5092-1 Notes
Zekun Shen and Brendan Dolan-Gavitt discovered a flaw in the mwifiex_usb_recv() function of the Marvell WiFi-Ex USB Driver. An attacker able to connect a crafted USB device can take advantage of this flaw to cause a denial of service.
Sushma Venkatesh Reddy discovered a missing GPU TLB flush in the i915 driver, resulting in denial of service or privilege escalation.
Samuel Page and Eric Dumazet reported a stack overflow in the networking module for the Transparent Inter-Process Communication (TIPC) protocol, resulting in denial of service or potentially the execution of arbitrary code.
It was discovered that an insufficient check in the KVM subsystem for s390x could allow unauthorized memory read or write access.
Max Kellermann discovered a flaw in the handling of pipe buffer flags. An attacker can take advantage of this flaw for local privilege escalation.
It was discovered that wrong file file descriptor handling in the VMware Virtual GPU driver (vmwgfx) could result in information leak or privilege escalation.
Lyu Tao reported a flaw in the NFS implementation in the Linux Kernel when handling requests to open a directory on a regular file, which could result in a information leak.
A memory leak was discovered in the yam_siocdevprivate() function of the YAM driver for AX.25, which could result in denial of service.
Szymon Heidrich reported the USB Gadget subsystem lacks certain validation of interface OS descriptor requests, resulting in memory
Szymon Heidrich reported that the RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command, resulting in Information leak from kernel memory.
For the stable distribution (bullseye), these problems have been fixed in version 5.10.92-2.