Mageia 2022-0305: kernel security update
Summary
This kernel update is based on upstream 5.15.62 and fixes at least the
following security issues:
A use-after-free flaw was found in the Linux kernel Atheros wireless adapter
driver in the way a user forces the ath9k_htc_wait_for_target function to
fail with some input messages. This flaw allows a local user to crash or
potentially escalate their privileges on the system (CVE-2022-1679).
A use-after-free flaw was found in the Linux kernel’s POSIX CPU timersfunctionality in the way a user creates and then deletes the timer in the
non-leader thread of the program. This flaw allows a local user to crash
or potentially escalate their privileges on the system (CVE-2022-2585).
A use-after-free flaw was found in nf_tables cross-table in the
net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows
a local, privileged attacker to cause a use-after-free problem at the time
of table deletion, possibly leading to local privilege escalation
(CVE-2022-2586).
A use-after-free...
References
- https://bugs.mageia.org/show_bug.cgi?id=30750
- https://bugs.mageia.org/show_bug.cgi?id=30725
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.59
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.60
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.61
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
Resolution
MGASA-2022-0305 - Updated kernel packages fix security vulnerabilities
SRPMS
- 8/core/kernel-5.15.62-1.mga8
- 8/core/kmod-virtualbox-6.1.36-1.10.mga8
- 8/core/kmod-xtables-addons-3.21-1.2.mga8
- 8/core/xtables-addons-3.21-1.mga8