Advisories ยป MGASA-2022-0213

Updated kernel-linus packages fix security vulnerabilities

Publication date: 28 May 2022
Modification date: 28 May 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-1729 , CVE-2022-21499

Description

This kernel-linus update is based on upstream 5.15.43 and fixes at least
the following security issues:

A race condition in the perf subsystem allows for a local privilege
escalation. NOTE: Mageia kernels by default has disabled the perf usage
for unprivileged users, effectively rendering this vulnerability harmless
(CVE-2022-1729).

Kernel could allow a remote attacker to bypass security restrictions,
caused by a lockdown break issue. By sending a specially-crafted request
using the kernel debugger, an attacker could exploit this vulnerability
to perform read and write access to kernel memory (CVE-2022-21499).

For other upstream fixes, see the referenced changelogs.
                

References

SRPMS

8/core