Mageia 2022-0195: kernel-linus security update
Summary
This kernel-linus update is based on upstream 5.15.41 and fixes at least the
following security issues:
A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading
to a possible out-of-bounds memory write in the Linux kernel BPF subsystem
due to the way a user loads BTF. This flaw allows a local user to crash or
escalate their privileges on the system. NOTE: Mageia kernels by default
prevents unprivileged users from being able to use eBPF so this would
require a privileged user with CAP_SYS_ADMIN or root to be able to abuse
this flaw reducing its attack space (CVE-2022-0500).
Due to the small table perturb size, a memory leak flaw was found in the
Linux kernel’s TCP source port generation algorithm in the net/ipv4/tcp.c
function. This flaw allows an attacker to leak information and may cause
a denial of service (CVE-2022-1012).
A flaw was found in the Linux kernel’s nfcmrvl_nci_unregister_dev()
function. A race condition leads to a use-after-free issue when simulati...
References
- https://bugs.mageia.org/show_bug.cgi?id=30436
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.36
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.37
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.38
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.39
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.40
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.41
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
Resolution
MGASA-2022-0195 - Updated kernel-linus packages fix security vulnerabilities
SRPMS
- 8/core/kernel-linus-5.15.41-1.mga8