MGASA-2022-0213

Source
https://advisories.mageia.org/MGASA-2022-0213.html
Import Source
https://advisories.mageia.org/MGASA-2022-0213.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0213
Related
Published
2022-05-28T08:56:13Z
Modified
2022-05-28T08:00:57Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This kernel-linus update is based on upstream 5.15.43 and fixes at least the following security issues:

A race condition in the perf subsystem allows for a local privilege escalation. NOTE: Mageia kernels by default has disabled the perf usage for unprivileged users, effectively rendering this vulnerability harmless (CVE-2022-1729).

Kernel could allow a remote attacker to bypass security restrictions, caused by a lockdown break issue. By sending a specially-crafted request using the kernel debugger, an attacker could exploit this vulnerability to perform read and write access to kernel memory (CVE-2022-21499).

For other upstream fixes, see the referenced changelogs.

References
Credits

Affected packages

Mageia:8 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.43-1.mga8

Ecosystem specific

{
    "section": "core"
}