Advisories ยป MGASA-2022-0041

Updated kernel packages fix security vulnerabilities

Publication date: 01 Feb 2022
Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-0330 , CVE-2022-22942 , CVE-2022-24122

Description

This kernel update is based on upstream 5.15.18 and fixes at least the
following security issues:

A random memory access flaw was found in the Linux kernels GPU i915 kernel
driver functionality in the way a user may run malicious code on the GPU.
This flaw allows a local user to crash the system or escalate their
privileges on the system (CVE-2022-0330).

A use-after-free flaw was found in the Linux kernels
vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/
vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user
privileges to cause a privilege escalation problem (CVE-2022-22942).

kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged
user namespaces are enabled, allows a use-after-free and privilege
escalation because a ucounts object can outlive its namespace
(CVE-2022-24122).

Other fixes in this update:
- fix broken RTL8814AU support (mga#29952)
- fix cifs failing to load on server kernels (mga#29957)
- fix broken plymouth scaling (mga#29925)
- bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
- fs/exec: require argv[0] presence in do_execveat_common()

For other upstream fixes, see the referenced changelogs.
                

References

SRPMS

8/core