Bug 30476 - Update request: kernel-linus-5.15.43-1.mga8
Summary: Update request: kernel-linus-5.15.43-1.mga8
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: High critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-05-26 09:01 CEST by Thomas Backlund
Modified: 2022-05-28 10:57 CEST (History)
2 users (show)

See Also:
Source RPM: kernel-linus
CVE:
Status comment:


Attachments

Description Thomas Backlund 2022-05-26 09:01:09 CEST
More security and bugfixes, advisory will follow...


SRPMS:
kernel-linus-5.15.43-1.mga8.src.rpm



i586:
kernel-linus-5.15.43-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-5.15.43-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-latest-5.15.43-1.mga8.i586.rpm
kernel-linus-doc-5.15.43-1.mga8.noarch.rpm
kernel-linus-latest-5.15.43-1.mga8.i586.rpm
kernel-linus-source-5.15.43-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.43-1.mga8.noarch.rpm



x86_64:
kernel-linus-5.15.43-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-5.15.43-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-latest-5.15.43-1.mga8.x86_64.rpm
kernel-linus-doc-5.15.43-1.mga8.noarch.rpm
kernel-linus-latest-5.15.43-1.mga8.x86_64.rpm
kernel-linus-source-5.15.43-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.43-1.mga8.noarch.rpm
Thomas Backlund 2022-05-26 09:03:25 CEST

Priority: Normal => High

Comment 1 Thomas Backlund 2022-05-26 09:57:36 CEST
Advisory, added to svn:

type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
 - CVE-2022-1729
 - CVE-2022-21499
src:
  8:
   core:
     - kernel-linus-5.15.43-1.mga8
description: |
  This kernel-linus update is based on upstream 5.15.43 and fixes at least
  the following security issues:

  A race condition in the perf subsystem allows for a local privilege
  escalation. NOTE: Mageia kernels by default has disabled the perf usage
  for unprivileged users, effectively rendering this vulnerability harmless
  (CVE-2022-1729).

  Kernel could allow a remote attacker to bypass security restrictions,
  caused by a lockdown break issue. By sending a specially-crafted request
  using the kernel debugger, an attacker could exploit this vulnerability
  to perform read and write access to kernel memory (CVE-2022-21499).

  For other upstream fixes, see the referenced changelogs.
references:
 - https://bugs.mageia.org/show_bug.cgi?id=30476
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.42
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.43

Keywords: (none) => advisory

Comment 2 Len Lawrence 2022-05-26 17:29:03 CEST
Kernel: 5.15.43-1.mga8 x86_64
Quad Core Intel Celeron J4125 [MCP]
Intel GeminiLake [UHD Graphics 600] driver: i915

Installed linus kernel from Core.
Updated via qarepo.  All fine and dandy after reboot apart from intermittent failures of response to the keyboard.  562 processes running on four cores.  Watched a bit of Youtube scifi with a bluetooth sound device.  That runs fine.
Linus kernel appears to be working on this underpowered system.

CC: (none) => tarazed25

Thomas Backlund 2022-05-28 09:57:40 CEST

Whiteboard: (none) => MGA8-64-OK
CC: (none) => sysadmin-bugs
Keywords: (none) => validated_update

Comment 3 Mageia Robot 2022-05-28 10:57:22 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0213.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.