Published on July 28, 2022
In the Debian GNU/Linux 11 “Bullseye” stable operating system series, there have been several security vulnerabilities that could allow privilege escalation, denial of service, or information leaks.
Debian Bullseye users are recommended to upgrade to the latest Linux 5.10 LTS kernel security update, which contains nine security updates.
A new kernel update resolves CVE-2021-33655, a use-after-free vulnerability in the Amateur Radio X.25 PLP ( Rose ) support, which could cause a denial of service.
Xen network backend CVE-2022-33743, an issue that allowed a remote denial of service attack, ARM Xen guests CVE-2022-33744, and Netfilter a heap buffer overflow CVE-2022-34918 are also addressed in this release.
The Xen block and network PV device frontends may be vulnerable to a series of security vulnerabilities, namely CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, and CVE-2022-33742. Grant tables are also granular, preventing sharing of less than 4k pages.
The above security issues are addressed in Linux kernel 5.10.127-2, which is recommended for all Debian GNU/Linux 11 “Bullseye” users. Running sudo apt update & sudo apt full-upgrade in a terminal emulator or using Synaptic Package Manager will install the latest version. Reboot your system after installing the new kernel version!
Presentations
Browse LSET presentations to understand interesting…
Explore Now
eBooks
Get complete guides to empower yourself academically…
Explore Now
Infographics
Learn about information technology and business…
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
Error: Contact form not found.
[wpforms id=”9030″]