Mageia 2022-0121: kernel security update
Summary
This kernel update is based on upstream 5.15.32 and fixes at least the
following security issues:
An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s
watch_queue event notification subsystem. This flaw can overwrite parts
of the kernel state, potentially allowing a local user to gain privileged
access or cause a denial of service on the system (CVE-2022-0995).
A flaw use after free in the Linux kernel FUSE filesystem was found in
the way user triggers write(). A local user could use this flaw to get
some unauthorized access to some data from the FUSE filesystem and as
result potentially privilege escalation too (CVE-2022-1011).
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c
of the netfilter subsystem. This flaw allows a local user to cause an
out-of-bounds write issue (CVE-2022-1015).
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:
nft_do_chain, which can cause a use-after-free. This issue needs to handle
'r...
References
- https://bugs.mageia.org/show_bug.cgi?id=30199
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.29
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.30
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.31
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.32
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
Resolution
MGASA-2022-0121 - Updated kernel packages fix security vulnerabilities
SRPMS
- 8/core/kernel-5.15.32-1.mga8
- 8/core/kmod-virtualbox-6.1.32-1.14.mga8
- 8/core/kmod-xtables-addons-3.18-1.64.mga8