it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5127-1] linux security update
- Date: Mon, 02 May 2022 21:02:58 +0000
- List-archive: https://lists.debian.org/msgid-search/E1nldC6-0004Vp-QQ AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=q22dTNU8+FOVHQsnglWbPqEjl89dowTa+GWXKMFIcUk=; b=Xc 8kab3KSSsQorAS7N3OBDO1/5BI1H8lGUpzi/pkP27h1nkt1fxzk2TsJeMVXdl9TZIOtvu//BVontY +BiGO69e1YtLIHfqukRB8OPr0OCYbDxDU/pbUXC+sNYx7cPkR1tn7BREki3nhKGupwHpi27GVJWwA g5OUvCflbKXFrwBB+VeDPiCHseU3NUrrwdPGMKbAntLKrIlQC3Dz3xh10vCmJ/vj24lVmuP08EmXi 3hSSijeI6MBF+CSJVCIG87xID6i26zeY35YSvsyKRojTUdpZr10v+OHgkIZXUCFo9O99UBOJK1QHp U7z2HP4Eovho5KHDrXObocKi3AbIrxaw==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 2 May 2022 21:03:15 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <z8Cl5mRuj-I.A.s8.TcEciB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5127-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 02, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2021-4197 CVE-2022-0168 CVE-2022-1016 CVE-2022-1048
CVE-2022-1158 CVE-2022-1195 CVE-2022-1198 CVE-2022-1199
CVE-2022-1204 CVE-2022-1205 CVE-2022-1353 CVE-2022-1516
CVE-2022-26490 CVE-2022-27666 CVE-2022-28356 CVE-2022-28388
CVE-2022-28389 CVE-2022-28390 CVE-2022-29582
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
CVE-2021-4197
Eric Biederman reported that incorrect permission checks in the
cgroup process migration implementation can allow a local attacker
to escalate privileges.
CVE-2022-0168
A NULL pointer dereference flaw was found in the CIFS client
implementation which can allow a local attacker with CAP_SYS_ADMIN
privileges to crash the system. The security impact is negligible as
CAP_SYS_ADMIN inherently gives the ability to deny service.
CVE-2022-1016
David Bouman discovered a flaw in the netfilter subsystem where the
nft_do_chain function did not initialize register data that
nf_tables expressions can read from and write to. A local attacker
can take advantage of this to read sensitive information.
CVE-2022-1048
Hu Jiahui discovered a race condition in the sound subsystem that
can result in a use-after-free. A local user permitted to access a
PCM sound device can take advantage of this flaw to crash the
system or potentially for privilege escalation.
CVE-2022-1158
Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered a bug in the
KVM implementation for x86 processors. A local user with access to
/dev/kvm could cause the MMU emulator to update page table entry
flags at the wrong address. They could exploit this to cause a
denial of service (memory corruption or crash) or possibly for
privilege escalation.
CVE-2022-1195
Lin Ma discovered race conditions in the 6pack and mkiss hamradio
drivers, which could lead to a use-after-free. A local user could
exploit these to cause a denial of service (memory corruption or
crash) or possibly for privilege escalation.
CVE-2022-1198
Duoming Zhou discovered a race condition in the 6pack hamradio
driver, which could lead to a use-after-free. A local user could
exploit this to cause a denial of service (memory corruption or
crash) or possibly for privilege escalation.
CVE-2022-1199, CVE-2022-1204, CVE-2022-1205
Duoming Zhou discovered race conditions in the AX.25 hamradio
protocol, which could lead to a use-after-free or null pointer
dereference. A local user could exploit this to cause a denial of
service (memory corruption or crash) or possibly for privilege
escalation.
CVE-2022-1353
The TCS Robot tool found an information leak in the PF_KEY
subsystem. A local user can receive a netlink message when an
IPsec daemon reegisters with the kernel, and this could include
sensitive information.
CVE-2022-1516
A NULL pointer dereference flaw in the implementation of the X.25
set of standardized network protocols, which can result in denial
of service.
This driver is not enabled in Debian's official kernel
configurations.
CVE-2022-26490
Buffer overflows in the STMicroelectronics ST21NFCA core driver can
result in denial of service or privilege escalation.
This driver is not enabled in Debian's official kernel
configurations.
CVE-2022-27666
"valis" reported a possible buffer overflow in the IPsec ESP
transformation code. A local user can take advantage of this flaw to
cause a denial of service or for privilege escalation.
CVE-2022-28356
Beraphin discovered that the ANSI/IEEE 802.2 LLC type 2 driver did
not properly perform reference counting on some error paths. A
local attacker can take advantage of this flaw to cause a denial
of service.
CVE-2022-28388
A double free vulnerability was discovered in the 8 devices USB2CAN
interface driver.
CVE-2022-28389
A double free vulnerability was discovered in the Microchip CAN BUS
Analyzer interface driver.
CVE-2022-28390
A double free vulnerability was discovered in the EMS CPC-USB/ARM7
CAN/USB interface driver.
CVE-2022-29582
Jayden Rivers and David Bouman discovered a user-after-free
vulnerability in the io_uring subystem due to a race condition in
io_uring timeouts. A local unprivileged user can take advantage of
this flaw for privilege escalation.
For the stable distribution (bullseye), these problems have been fixed in
version 5.10.113-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=vCuc
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5127-1] linux security update, Salvatore Bonaccorso, 02.05.2022
Archiv bereitgestellt durch MHonArc 2.6.24.