Lucene search

K
debianDebianDEBIAN:DSA-5161-1:2800F
HistoryJun 11, 2022 - 9:15 a.m.

[SECURITY] [DSA 5161-1] linux security update

2022-06-1109:15:06
lists.debian.org
57
debian security advisory
linux
kernel
vulnerabilities
privilege escalation
denial of service
information leak
cve-2022-0494
cve-2022-0854
cve-2022-1012
cve-2022-1729
cve-2022-1786
cve-2022-1789
cve-2022-1852
cve-2022-1966
cve-2022-1972
cve-2022-1974
cve-2022-1975
cve-2022-21499
cve-2022-28893
bullseye
upgrade

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

50.9%


Debian Security Advisory DSA-5161-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
June 11, 2022 https://www.debian.org/security/faq


Package : linux
CVE ID : CVE-2022-0494 CVE-2022-0854 CVE-2022-1012 CVE-2022-1729
CVE-2022-1786 CVE-2022-1789 CVE-2022-1852 CVE-2022-1966
CVE-2022-1972 CVE-2022-1974 CVE-2022-1975 CVE-2022-21499
CVE-2022-28893

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

CVE-2022-0494

The scsi_ioctl() was susceptible to an information leak only
exploitable by users with CAP_SYS_ADMIN or CAP_SYS_RAWIO
capabilities.

CVE-2022-0854

Ali Haider discovered a potential information leak in the DMA
subsystem. On systems where the swiotlb feature is needed, this
might allow a local user to read sensitive information.

CVE-2022-1012

The randomisation when calculating port offsets in the IP
implementation was enhanced.

CVE-2022-1729

Norbert Slusarek discovered a race condition in the perf subsystem
which could result in local privilege escalation to root. The
default settings in Debian prevent exploitation unless more
permissive settings have been applied in the
kernel.perf_event_paranoid sysctl.

CVE-2022-1786

Kyle Zeng discovered a use-after-free in the io_uring subsystem
which way result in local privilege escalation to root.

CVE-2022-1789 / CVE-2022-1852

Yongkang Jia, Gaoning Pan and Qiuhao Li discovered two NULL pointer
dereferences in KVM's CPU instruction handling, resulting in denial
of service.

CVE-2022-1966

Aaron Adams discovered a use-after-free in Netfilter which may
result in local privilege escalation to root.

CVE-2022-1972

Ziming Zhang discovered an out-of-bound write in Netfilter which may
result in local privilege escalation to root.

CVE-2022-1974 / CVE-2022-1975

Duoming Zhou discovered that the NFC netlink interface was
suspectible to denial of service.

CVE-2022-21499

It was discovered that the kernel debugger could be used to bypass
UEFI Secure Boot restrictions.

CVE-2022-28893

Felix Fu discovered a use-after-free in the implementation of the
Remote Procedure Call (SunRPC) protocol, which could in denial of
service or an information leak.

For the stable distribution (bullseye), these problems have been fixed in
version 5.10.120-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

50.9%