{
  "schema_version": "1.6.2",
  "id": "MGASA-2022-0122",
  "published": "2022-03-29T14:25:34Z",
  "modified": "2022-04-06T14:51:28Z",
  "summary": "Updated kernel-linus packages fix security vulnerabilities",
  "details": "This kernel-linus update is based on upstream 5.15.32 and fixes at least\nthe following security issues:\n\nAn out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s\nwatch_queue event notification subsystem. This flaw can overwrite parts\nof the kernel state, potentially allowing a local user to gain privileged\naccess or cause a denial of service on the system (CVE-2022-0995).\n\nA flaw use after free in the Linux kernel FUSE filesystem was found in\nthe way user triggers write(). A local user could use this flaw to get\nsome unauthorized access to some data from the FUSE filesystem and as\nresult potentially privilege escalation too (CVE-2022-1011).\n\nA flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c\nof the netfilter subsystem. This flaw allows a local user to cause an\nout-of-bounds write issue (CVE-2022-1015).\n\nA flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:\nnft_do_chain, which can cause a use-after-free. This issue needs to handle\n'return' with proper preconditions, as it can lead to a kernel information\nleak problem caused by a local, unprivileged attacker (CVE-2022-1016).\n\nA use-after-free flaw was found in the Linux kernel’s sound subsystem in\nthe way a user triggers concurrent calls of PCM hw_params. The hw_free\nioctls or similar race condition happens inside ALSA PCM for other ioctls.\nThis flaw allows a local user to crash or potentially escalate their\nprivileges on the system (CVE-2022-1048).\n\nst21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c has\nEVT_TRANSACTION buffer overflows because of untrusted length parameters\n(CVE-2022-26490).\n\nThere is a buffer overflow in ESP transformation in net/ipv4/esp4.c and\nnet/ipv6/esp6.c via a large message. In some configurations, local users\ncan gain privileges by overwriting kernel heap objects (CVE-2022-27666).\n\nA refcount leak bug was found in net/llc/af_llc.c (CVE-2022-28356).\n\nFor other upstream fixes, see the referenced changelogs.\n",
  "related": [
    "CVE-2022-0995",
    "CVE-2022-1011",
    "CVE-2022-1015",
    "CVE-2022-1016",
    "CVE-2022-1048",
    "CVE-2022-26490",
    "CVE-2022-27666",
    "CVE-2022-28356"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2022-0122.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=30200"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.29"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.30"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.31"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.32"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:8",
        "name": "kernel-linus",
        "purl": "pkg:rpm/mageia/kernel-linus?arch=source&distro=mageia-8"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.15.32-1.mga8"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
