Closing down a local root exploit... SRPM: kernel-linus-5.15.16-1.mga8.src.rpm i586: kernel-linus-5.15.16-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-5.15.16-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-latest-5.15.16-1.mga8.i586.rpm kernel-linus-doc-5.15.16-1.mga8.noarch.rpm kernel-linus-latest-5.15.16-1.mga8.i586.rpm kernel-linus-source-5.15.16-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.16-1.mga8.noarch.rpm x86_64: kernel-linus-5.15.16-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-5.15.16-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-latest-5.15.16-1.mga8.x86_64.rpm kernel-linus-doc-5.15.16-1.mga8.noarch.rpm kernel-linus-latest-5.15.16-1.mga8.x86_64.rpm kernel-linus-source-5.15.16-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.16-1.mga8.noarch.rpm
Advisory, added to svn: type: security subject: Updated kernel-linus packages fix security vulnerability CVE: - CVE-2022-0185 src: 8: core: - kernel-linus-5.15.16-1.mga8 description: | This kernel-linus update is based on upstream 5.15.16 and fixes atleast the following security issue: William Liu and Jamie Hill-Daniel discovered that the file system context functionality in the Linux kernel contained an integer underflow vulnerability, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code (CVE-2022-0185). references: - https://bugs.mageia.org/show_bug.cgi?id=29917 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.16
Priority: Normal => HighKeywords: (none) => advisory
Component: RPM Packages => SecurityQA Contact: (none) => security
x86_64 Installed without problems on intel Core i7 with nvidia graphics. Ran a few tests on Mate desktop - no issues - leaving it running.
CC: (none) => tarazed25
Thanks for the tests, flushing out...
Keywords: (none) => validated_updateWhiteboard: (none) => MGA8-64-OKCC: (none) => sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0027.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED