Mageia 2022-0263: kernel security update
Summary
This kernel update is based on upstream 5.15.55 and fixes at least the
following security issues:
There are use-after-free vulnerabilities caused by timer handler in
net/rose/rose_timer.c of linux that allow attackers to crash linux kernel
without any privileges (CVE-2022-2318).
Xen Block and Network PV device frontends don't zero memory regions before
sharing them with the backend (CVE-2022-26365, CVE-2022-33740, XSA-403).
Additionally the granularity of the grant table doesn't allow sharing less
than a 4K page, leading to unrelated data residing in the same 4K page as
data shared with a backend being accessible by such backend (CVE-2022-33741,
CVE-2022-33742, XSA-403).
Xen network backend may cause Linux netfront to use freed SKBs While adding
logic to support XDP (eXpress Data Path), a code label was moved in a way
allowing for SKBs having references (pointers) retained for further
processing to nevertheless be freed (CVE-2022-33743, XSA-405).
Xen Arm guests can cause Dom0 DoS vi...
References
- https://bugs.mageia.org/show_bug.cgi?id=30642
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.51
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.52
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.53
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.54
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.55
- https://xenbits.xen.org/xsa/advisory-403.html
- https://xenbits.xen.org/xsa/advisory-405.html
- https://xenbits.xen.org/xsa/advisory-406.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
Resolution
MGASA-2022-0263 - Updated kernel packages fix security vulnerabilities
SRPMS
- 8/core/kernel-5.15.55-2.mga8
- 8/core/kmod-virtualbox-6.1.34-1.25.mga8
- 8/core/kmod-xtables-addons-3.20-1.25.mga8