Menü Schließen

Linux Security Kernel Update [DSA 5161-1]

Logo debian

Es wurden 13 Sicherheitslücken im Linux Kernel gefunden. Diese ermöglichen es unter anderem die Rechte auszuweiten und sich Zugriff zum System zu verschaffen. Es sollte daher umgehend ein Update durchgeführt werden und der Kernel in min Version : 5.10.120-1 installiert werden.

CVE-2022-0494

The scsi_ioctl() was susceptible to an information leak only exploitable by users with CAP_SYS_ADMIN or CAP_SYS_RAWIO capabilities.

CVE-2022-0854

Ali Haider discovered a potential information leak in the DMA subsystem. On systems where the swiotlb feature is needed, this might allow a local user to read sensitive information.

CVE-2022-1012

The randomisation when calculating port offsets in the IP implementation was enhanced.

CVE-2022-1729

Norbert Slusarek discovered a race condition in the perf subsystem which could result in local privilege escalation to root. The default settings in Debian prevent exploitation unless more permissive settings have been applied in the kernel.perf_event_paranoid sysctl.

CVE-2022-1786

Kyle Zeng discovered a use-after-free in the io_uring subsystem which way result in local privilege escalation to root.

CVE-2022-1789 / CVE-2022-1852

Yongkang Jia, Gaoning Pan and Qiuhao Li discovered two NULL pointer dereferences in KVM’s CPU instruction handling, resulting in denial of service.

CVE-2022-1966

Aaron Adams discovered a use-after-free in Netfilter which may result in local privilege escalation to root.

CVE-2022-1972

Ziming Zhang discovered an out-of-bound write in Netfilter which may result in local privilege escalation to root.

CVE-2022-1974 / CVE-2022-1975

Duoming Zhou discovered that the NFC netlink interface was suspectible to denial of service.

CVE-2022-21499

It was discovered that the kernel debugger could be used to bypass UEFI Secure Boot restrictions.

CVE-2022-28893

Felix Fu discovered a use-after-free in the implementation of the Remote Procedure Call (SunRPC) protocol, which could in denial of service or an information leak.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert