MGASA-2022-0230

Source
https://advisories.mageia.org/MGASA-2022-0230.html
Import Source
https://advisories.mageia.org/MGASA-2022-0230.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0230
Related
Published
2022-06-13T20:44:20Z
Modified
2022-06-13T19:55:00Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This kernel-linus update is based on upstream 5.15.46 and fixes at least the following security issues:

KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID (CVE-2022-1789).

KVM: x86: avoid calling x86 emulator without a decoded instruction (CVE-2022-1852).

A use-after-free vulnerability was found in the Linux kernel's Netfilter subsystem in net/netfilter/nftablesapi.c. This flaw allows a local attacker with user access to cause a privilege escalation issue (CVE-2022-1966).

An out-of-bound write vulnerability was identified within the netfilter subsystem which can be exploited to achieve privilege escalation to root. In order to trigger the issue it requires the ability to create user/net namespaces (CVE-2022-1972).

fs/ntfs3: Fix invalid free in log_replay (CVE-2022-1973).

For other upstream fixes, see the referenced changelogs.

References
Credits

Affected packages

Mageia:8 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.46-1.mga8

Ecosystem specific

{
    "section": "core"
}