Mageia 2022-0063: kernel-linus security update
Summary
This kernel-linus update is based on upstream 5.15.23 and fixes atleast
the following security issues:
A stack overflow flaw was found in the Linux kernel TIPC protocol
functionality in the way a user sends a packet with malicious content
where the number of domain member nodes is higher than the 64 allowed.
This flaw allows a remote user to crash the system or possibly escalate
their privileges if they have access to the TIPC network (CVE-2022-0435).
A vulnerability was found in the Linux kernel cgroup_release_agent_write
in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain
circumstances, allows the use of the cgroups v1 release_agent feature to
escalate privileges and bypass the namespace isolation unexpectedly
(CVE-2022-0492).
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged
user namespaces are enabled, allows a use-after-free and privilege
escalation because a ucounts object can outlive its namespace
(CVE-2022-24122).
An issue was discove...
References
- https://bugs.mageia.org/show_bug.cgi?id=30031
- https://bugs.mageia.org/show_bug.cgi?id=29965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
Resolution
MGASA-2022-0063 - Updated kernel-linus packages fix security vulnerabilities
SRPMS
- 8/core/kernel-linus-5.15.23-1.mga8