Same critical security fix as SRPM: kernel-linus-5.15.26-1.mga8.src.rpm i586: kernel-linus-5.15.26-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-5.15.26-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-latest-5.15.26-1.mga8.i586.rpm kernel-linus-doc-5.15.26-1.mga8.noarch.rpm kernel-linus-latest-5.15.26-1.mga8.i586.rpm kernel-linus-source-5.15.26-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.26-1.mga8.noarch.rpm x86_64: kernel-linus-5.15.26-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-5.15.26-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-latest-5.15.26-1.mga8.x86_64.rpm kernel-linus-doc-5.15.26-1.mga8.noarch.rpm kernel-linus-latest-5.15.26-1.mga8.x86_64.rpm kernel-linus-source-5.15.26-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.26-1.mga8.noarch.rpm
Severity: normal => criticalPriority: Normal => High
Advisory, added to svn: type: security subject: Updated kernel-linus packages fix security vulnerabilities CVE: - CVE-2022-0847 - CVE-2022-25258 - CVE-2022-25375 - CVE-2022-25636 src: 8: core: - kernel-linus-5.15.26-1.mga8 description: | This kernel-linus update is based on upstream 5.15.26 and fixes at least the following security issues: A vulnerability in the Linux kernel since version 5.8 due to uninitialized variables. It enables anybody to write arbitrary data to arbitrary files, even if the file is O_RDONLY, immutable or on a MS_RDONLY filesystem. It can be used to inject code into arbitrary processes (CVE-2022-0847). An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur (CVE-2022-25258). An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (CVE-2022-25375). net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload (CVE-2022-25636). For other upstream fixes, see the referenced changelogs. references: - https://bugs.mageia.org/show_bug.cgi?id=30139 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.24 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.25 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.26
Keywords: (none) => advisory
In the "Core Updates Testing" repository, I'm seeing kernel version 5.15.27 instead of the mentioned above 5.15.26. Please clarify if the 5.15.27 are to be tested or is there an issue that needs to be corrected. cpupower 5.15.27 1.mga8 x86_64 kernel-desktop-5.15.27-1.mga8 1 1.mga8 x86_64 kernel-desktop-devel-5.15.27-> 1 1.mga8 x86_64 kernel-desktop-devel-latest 5.15.27 1.mga8 x86_64 kernel-desktop-latest 5.15.27 1.mga8 x86_64 kernel-userspace-headers 5.15.27 1.mga8 x86_64 perf 5.15.27 1.mga8 x86_64
CC: (none) => mageia
That is odd. Pasting the list into qarepo and updating downloads the 5.15.26 RPMs and installation continues to run smoothly after that.
CC: (none) => tarazed25
Continuing from comment 3. rpm -q kernel-linus-latest kernel-linus-latest-5.15.26-1.mga8 No menu entry at reboot so had to run `sudo drakboot --boot` and reboot. Everything running normally in Mate except bluetooth - had to remove audio device and repeat search and connect sequence to recover it. This happens now and again with kernel tests. Networking OK, desktop applications. Leaving this to run for a day or two. Mobo: MSI model: Z97-G43 Quad Core Intel Core i7-4790 NVIDIA GM204 [GeForce GTX 970] Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet - r8169
(In reply to PC LX from comment #2) > In the "Core Updates Testing" repository, I'm seeing kernel version 5.15.27 > instead of the mentioned above 5.15.26. Please clarify if the 5.15.27 are to > be tested or is there an issue that needs to be corrected. Those are new test-kernels for the Spectre-BHB / BHI issue that went public yesterday, but this report is about kernel-*linus*-5.15.26
Thanks for the test, Flushing out due to the critical security issue...
Keywords: (none) => validated_updateWhiteboard: (none) => MGA8-64-OKCC: (none) => sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0095.html
Status: NEW => RESOLVEDResolution: (none) => FIXED