| Summary: | Update request: kernel-linus-5.15.32-1.mga8 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | kernel-linus | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2022-03-24 09:10:15 CET
Advisory, added to svn:
type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
- CVE-2022-0995
- CVE-2022-1011
- CVE-2022-27666
src:
8:
core:
- kernel-linus-5.15.31-1.mga8
description: |
This kernel-linus update is based on upstream 5.15.31 and fixes at least
the following security issues:
An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s
watch_queue event notification subsystem. This flaw can overwrite parts
of the kernel state, potentially allowing a local user to gain privileged
access or cause a denial of service on the system (CVE-2022-0995).
A flaw use after free in the Linux kernel FUSE filesystem was found in
the way user triggers write(). A local user could use this flaw to get
some unauthorized access to some data from the FUSE filesystem and as
result potentially privilege escalation too (CVE-2022-1011).
There is a buffer overflow in ESP transformation in net/ipv4/esp4.c and
net/ipv6/esp6.c via a large message. In some configurations, local users
can gain privileges by overwriting kernel heap objects (CVE-2022-27666).
For other upstream fixes, see the referenced changelogs.
references:
- https://bugs.mageia.org/show_bug.cgi?id=30200
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.29
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.30
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.31Keywords:
(none) =>
advisory putting this one on hold too as it's affected by the same ath9k breakage that is reported in the kernel-5.15.31 update bug https://bugs.mageia.org/show_bug.cgi?id=30199#c9 Keywords:
(none) =>
feedback New set... SRPM: kernel-linus-5.15.32-1.mga8.src.rpm i586: kernel-linus-5.15.32-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-5.15.32-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-latest-5.15.32-1.mga8.i586.rpm kernel-linus-doc-5.15.32-1.mga8.noarch.rpm kernel-linus-latest-5.15.32-1.mga8.i586.rpm kernel-linus-source-5.15.32-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.32-1.mga8.noarch.rpm x86_64: kernel-linus-5.15.32-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-5.15.32-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-latest-5.15.32-1.mga8.x86_64.rpm kernel-linus-doc-5.15.32-1.mga8.noarch.rpm kernel-linus-latest-5.15.32-1.mga8.x86_64.rpm kernel-linus-source-5.15.32-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.32-1.mga8.noarch.rpm Summary:
Update request: kernel-linus-5.15.31-1.mga8 =>
Update request: kernel-linus-5.15.32-1.mga8
Updated advisory, added to svn:
type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
- CVE-2022-0995
- CVE-2022-1011
- CVE-2022-1048
- CVE-2022-26490
- CVE-2022-27666
src:
8:
core:
- kernel-linus-5.15.32-1.mga8
description: |
This kernel-linus update is based on upstream 5.15.32 and fixes at least
the following security issues:
An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s
watch_queue event notification subsystem. This flaw can overwrite parts
of the kernel state, potentially allowing a local user to gain privileged
access or cause a denial of service on the system (CVE-2022-0995).
A flaw use after free in the Linux kernel FUSE filesystem was found in
the way user triggers write(). A local user could use this flaw to get
some unauthorized access to some data from the FUSE filesystem and as
result potentially privilege escalation too (CVE-2022-1011).
A use-after-free flaw was found in the Linux kernel’s sound subsystem in
the way a user triggers concurrent calls of PCM hw_params. The hw_free
ioctls or similar race condition happens inside ALSA PCM for other ioctls.
This flaw allows a local user to crash or potentially escalate their
privileges on the system (CVE-2022-1048).
st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c has
EVT_TRANSACTION buffer overflows because of untrusted length parameters
(CVE-2022-26490).
There is a buffer overflow in ESP transformation in net/ipv4/esp4.c and
net/ipv6/esp6.c via a large message. In some configurations, local users
can gain privileges by overwriting kernel heap objects (CVE-2022-27666).
For other upstream fixes, see the referenced changelogs.
references:
- https://bugs.mageia.org/show_bug.cgi?id=30200
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.29
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.30
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.31
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.32
Security fixes addendum to advisory A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue (CVE-2022-1015). A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c: nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker (CVE-2022-1016). boots ok on x86_64 here. Flushing out due to exploits going public Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0122.html Resolution:
(none) =>
FIXED |