| Summary: | Update request: kernel-linus-5.15.26-1.mga8 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | High | CC: | mageia, sysadmin-bugs, tarazed25 |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | kernel-linus | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2022-03-08 18:12:02 CET
Thomas Backlund
2022-03-08 18:12:12 CET
Severity:
normal =>
critical
Advisory, added to svn:
type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
- CVE-2022-0847
- CVE-2022-25258
- CVE-2022-25375
- CVE-2022-25636
src:
8:
core:
- kernel-linus-5.15.26-1.mga8
description: |
This kernel-linus update is based on upstream 5.15.26 and fixes at least
the following security issues:
A vulnerability in the Linux kernel since version 5.8 due to uninitialized
variables. It enables anybody to write arbitrary data to arbitrary files,
even if the file is O_RDONLY, immutable or on a MS_RDONLY filesystem.
It can be used to inject code into arbitrary processes (CVE-2022-0847).
An issue was discovered in drivers/usb/gadget/composite.c in the Linux
kernel before 5.16.10. The USB Gadget subsystem lacks certain validation
of interface OS descriptor requests (ones with a large array index and
ones associated with NULL function pointer retrieval). Memory corruption
might occur (CVE-2022-25258).
An issue was discovered in drivers/usb/gadget/function/rndis.c in the
Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of
the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive
information from kernel memory (CVE-2022-25375).
net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10
allows local users to gain privileges because of a heap out-of-bounds
write. This is related to nf_tables_offload (CVE-2022-25636).
For other upstream fixes, see the referenced changelogs.
references:
- https://bugs.mageia.org/show_bug.cgi?id=30139
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.24
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.25
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.26Keywords:
(none) =>
advisory In the "Core Updates Testing" repository, I'm seeing kernel version 5.15.27 instead of the mentioned above 5.15.26. Please clarify if the 5.15.27 are to be tested or is there an issue that needs to be corrected. cpupower 5.15.27 1.mga8 x86_64 kernel-desktop-5.15.27-1.mga8 1 1.mga8 x86_64 kernel-desktop-devel-5.15.27-> 1 1.mga8 x86_64 kernel-desktop-devel-latest 5.15.27 1.mga8 x86_64 kernel-desktop-latest 5.15.27 1.mga8 x86_64 kernel-userspace-headers 5.15.27 1.mga8 x86_64 perf 5.15.27 1.mga8 x86_64 CC:
(none) =>
mageia That is odd. Pasting the list into qarepo and updating downloads the 5.15.26 RPMs and installation continues to run smoothly after that. CC:
(none) =>
tarazed25 Continuing from comment 3. rpm -q kernel-linus-latest kernel-linus-latest-5.15.26-1.mga8 No menu entry at reboot so had to run `sudo drakboot --boot` and reboot. Everything running normally in Mate except bluetooth - had to remove audio device and repeat search and connect sequence to recover it. This happens now and again with kernel tests. Networking OK, desktop applications. Leaving this to run for a day or two. Mobo: MSI model: Z97-G43 Quad Core Intel Core i7-4790 NVIDIA GM204 [GeForce GTX 970] Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet - r8169 (In reply to PC LX from comment #2) > In the "Core Updates Testing" repository, I'm seeing kernel version 5.15.27 > instead of the mentioned above 5.15.26. Please clarify if the 5.15.27 are to > be tested or is there an issue that needs to be corrected. Those are new test-kernels for the Spectre-BHB / BHI issue that went public yesterday, but this report is about kernel-*linus*-5.15.26 Thanks for the test, Flushing out due to the critical security issue... Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0095.html Status:
NEW =>
RESOLVED |