Advisories ยป MGASA-2022-0229

Updated kernel packages fix security vulnerabilities

Publication date: 13 Jun 2022
Modification date: 13 Jun 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-1852 , CVE-2022-1966 , CVE-2022-1972 , CVE-2022-1973

Description

This kernel update is based on upstream 5.15.46 and fixes at least the
following security issues:

KVM: x86: avoid calling x86 emulator without a decoded instruction
(CVE-2022-1852).

A use-after-free vulnerability was found in the Linux kernel's Netfilter
subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local
attacker with user access to cause a privilege escalation issue
(CVE-2022-1966).

An out-of-bound write vulnerability was identified within the netfilter
subsystem which can be exploited to achieve privilege escalation to
root. In order to trigger the issue it requires the ability to create
user/net namespaces (CVE-2022-1972).

fs/ntfs3: Fix invalid free in log_replay (CVE-2022-1973).

Other fixes in this update:
- x86/amd_nb: Add AMD Family 17h A0-AF IDs
- x86/amd_nb: Add Family 19h model 70h-7Fh IDs
- x86/amd_nb: Add Family 19h model 60h-6Fh IDs
- hwmon: (k10temp): Add support for family 17h models A0h-AFh
- hwmon: (k10temp): Add support for family 19h models 70h-7Fh
- hwmon: (k10temp): Add support for family 19h models 60h-6Fh

For other upstream fixes, see the referenced changelogs.
                

References

SRPMS

8/core