Why You Shouldn't Use Microsoft Windows11.

...

LMDE5 - Linux Mint Debian Edition.

LMDE5 -...

Why Should I Not Use Windows10?

Here are a...

Debian 11 Linux, LMDE5 Kernel Update 5.10.127-2

English

Debian 11 Linux, LMDE5 Kernel Update 5.10.127-2.

The Linux Kernel is responsible for hardware and drivers support, with each update more are added together with bug fixes and added security.

New kernel release for Debian 11 "Bullseye" and LMDE5 users.

Previous version: 5.10.127-1.

Note: Update available in Update Manager.

Note that this update "will not remove" your existing kernel.

You will still be able to boot with the current kernel by choosing the advanced options in your boot menu. Please be cautious though.. kernel regressions can affect your ability to connect to the Internet or to log in graphically.

DKMS modules are compiled for the most recent kernels installed on your computer. If you are using proprietary drivers and you want to use an older kernel, you will need to remove the new one first.

All users are urged to update asap.

This update affects the following installed packages:
    • linux-compiler-gcc-10-x86
    • linux-headers-5.10.0-16-amd64
    • linux-headers-5.10.0-16-common
    • linux-headers-amd64
    • linux-image-5.10.0-16-amd64
    • linux-image-amd64
    • linux-kbuild-5.10
    • linux-libc-dev
Total size: 66 MB

Note: No changelog available but, this is what have been fixed.

Some of the new fixes:

Several vulnerabilities that was discovered in the Linux kernel, may lead to privilege escalation, denial of service or information leaks. Here is what has been fixed.

CVE ID: CVE-2021-33655 CVE-2022-2318 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 CVE-2022-33743 CVE-2022-33744 CVE-2022-34918

CVE-2021-33655:
A user with access to a framebuffer console driver could cause a memory out-of-bounds write via the FBIOPUT_VSCREENINFO ioctl.

CVE-2022-2318:
A use-after-free in the Amateur Radio X.25 PLP (Rose) support may result in denial of service.

CVE-2022-26365 / CVE-2022-33740 / CVE-2022-33741 / CVE-2022-33742:
Roger Pau Monne discovered that Xen block and network PV device frontends don't zero out memory regions before sharing them with the backend, which may result in information disclosure. Additionally it was discovered that the granularity of the grant table doesn't permit sharing less than a 4k page, which may also result in information disclosure.

CVE-2022-33743:
Jan Beulich discovered that incorrect memory handling in the Xen network backend may lead to denial of service.

CVE-2022-33744:
Oleksandr Tyshchenko discovered that ARM Xen guests can cause a denial of service to the Dom0 via paravirtual devices.

CVE-2022-34918:
Arthur Mongodin discovered a heap buffer overflow in the Netfilter subsystem which may result in local privilege escalation.

For the Debian 11 "Bullseye and LMDE5" these problems have been fixed in version 5.10.127-2.

 

Help us by donating a small amount

 
If you find this site helpful, please consider donating a small amount.
Please use our contact us form and we will give you the relevant information to make a donation.
We accept BitCoin and ZCash at the moment.

Games For Linux

Windows has always been the preferred platform for gaming, but after STEAM's interest in Linux more game developers are making their games natively available for Linux.

Disclaimer

All information on this website is published in good faith and for general educational purposes and for use in safe testing environments only. While linuxexperten.com strives to make the information on this site as accurate as possible, linuxexperten.com does not warrant its completeness, reliability and accuracy.

We are not responsible for any losses or damages associated with the use of our website. While we strive to provide only links to useful websites, we have no control over the content of these sites and links to other sites do not constitute a recommendation for all content contained on these websites.

 

Site Information

This is a professional review site that receives compensation from the companies whose products reviewed. Each service or product are thoroughly tested and given high marks if considered to be the very best. Independently owned and the opinions expressed here are no one elses.

 

Limited Time Offers

NordVPN + 3 Months