exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5191-1

Debian Security Advisory 5191-1
Posted Jul 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5191-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to privilege escalation, denial of service or information leaks.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2021-33655, CVE-2022-2318, CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742, CVE-2022-33743, CVE-2022-33744, CVE-2022-34918
SHA-256 | 914eefcc94d369cd1ff3058c3f8c135f235e5f4f9241b7711804c19b9c63953d

Debian Security Advisory 5191-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5191-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 26, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2021-33655 CVE-2022-2318 CVE-2022-26365 CVE-2022-33740
CVE-2022-33741 CVE-2022-33742 CVE-2022-33743 CVE-2022-33744
CVE-2022-34918

Several vulnerabilities have been discovered in the Linux kernel that may
lead to privilege escalation, denial of service or information leaks:

CVE-2021-33655

A user with access to a framebuffer console driver could cause a
memory out-of-bounds write via the FBIOPUT_VSCREENINFO ioctl.

CVE-2022-2318

A use-after-free in the Amateur Radio X.25 PLP (Rose) support may
result in denial of service.

CVE-2022-26365 / CVE-2022-33740 / CVE-2022-33741 / CVE-2022-33742

Roger Pau Monne discovered that Xen block and network PV device
frontends don't zero out memory regions before sharing them with the
backend, which may result in information disclosure. Additionally it
was discovered that the granularity of the grant table doesn't permit
sharing less than a 4k page, which may also result in information
disclosure.

CVE-2022-33743

Jan Beulich discovered that incorrect memory handling in the Xen
network backend may lead to denial of service.

CVE-2022-33744

Oleksandr Tyshchenko discovered that ARM Xen guests can cause a denial
of service to the Dom0 via paravirtual devices.

CVE-2022-34918

Arthur Mongodin discovered a heap buffer overflow in the Netfilter
subsystem which may result in local privilege escalation.

For the stable distribution (bullseye), these problems have been fixed in
version 5.10.127-2.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=DZil
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close