CVE-2022-4378

NameCVE-2022-4378
DescriptionA stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3244-1, DLA-3245-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye (security), bullseye5.10.223-1fixed
bookworm6.1.106-3fixed
bookworm (security)6.1.112-1fixed
trixie6.10.11-1fixed
sid6.10.12-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcebuster4.19.269-1DLA-3245-1
linuxsourcebullseye5.10.158-1
linuxsource(unstable)6.0.12-1
linux-5.10sourcebuster5.10.158-2~deb10u1DLA-3244-1

Notes

https://www.openwall.com/lists/oss-security/2022/12/09/1
https://git.kernel.org/linus/bce9332220bd677d83b19d21502776ad555a0e73
https://git.kernel.org/linus/e6cfaf34be9fcd1a8285a294e18986bfc41a409c

Search for package or bug name: Reporting problems