| Summary: | Update request: kernel-linus-5.15.23-1.mg8 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs, tarazed25 |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | kernel-linus | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2022-02-11 17:08:11 CET
x86_64. Quad Core Intel Core i7-4790 NVIDIA GM204 [GeForce GTX 970] - NVIDIA 470.74 Updated the linus kernel and dragged in 250 other updates. Looks like this partition has not been visited in a while. Rebooted OK - virtualbox driver rebuilt during boot. Mate desktop running fine but had a little trouble reconnecting to bluetooth audio. Had to remove the device and set it up again. NFS and NAS working on the LAN. VirtualBox works for the three vdis located on an external spinning rust drive connected over USB2. CC:
(none) =>
tarazed25
Thanks for the test, flushing out...
Advisory, added to svn:
type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
- CVE-2022-0435
- CVE-2022-0492
- CVE-2022-24122
- CVE-2022-24448
src:
8:
core:
- kernel-linus-5.15.23-1.mga8
description: |
This kernel-linus update is based on upstream 5.15.23 and fixes atleast
the following security issues:
A stack overflow flaw was found in the Linux kernel TIPC protocol
functionality in the way a user sends a packet with malicious content
where the number of domain member nodes is higher than the 64 allowed.
This flaw allows a remote user to crash the system or possibly escalate
their privileges if they have access to the TIPC network (CVE-2022-0435).
A vulnerability was found in the Linux kernel cgroup_release_agent_write
in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain
circumstances, allows the use of the cgroups v1 release_agent feature to
escalate privileges and bypass the namespace isolation unexpectedly
(CVE-2022-0492).
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged
user namespaces are enabled, allows a use-after-free and privilege
escalation because a ucounts object can outlive its namespace
(CVE-2022-24122).
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5.
If an application sets the O_DIRECTORY flag, and tries to open a regular
file, nfs_atomic_open() performs a regular lookup. If a regular file is
found, ENOTDIR should occur, but the server instead returns uninitialized
data in the file descriptor (CVE-2022-24448).
Other fixes in this update:
- enable several missed MediaTek wifi drivers (mga#29965)
For other upstream fixes, see the referenced changelogs.
references:
- https://bugs.mageia.org/show_bug.cgi?id=30031
- https://bugs.mageia.org/show_bug.cgi?id=29965CC:
(none) =>
sysadmin-bugs An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0063.html Status:
NEW =>
RESOLVED |