MGASA-2022-0041 - Updated kernel packages fix security vulnerabilities

Publication date: 01 Feb 2022
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-0330,

This kernel update is based on upstream 5.15.18 and fixes atleast the
following security issues:

A random memory access flaw was found in the Linux kernels GPU i915 kernel
driver functionality in the way a user may run malicious code on the GPU.
This flaw allows a local user to crash the system or escalate their
privileges on the system (CVE-2022-0330).

A use-after-free flaw was found in the Linux kernels
vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/
vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user
privileges to cause a privilege escalation problem (CVE-2022-22942).

kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged
user namespaces are enabled, allows a use-after-free and privilege
escalation because a ucounts object can outlive its namespace

Other fixes in this update:
- fix broken RTL8814AU support (mga#29952)
- fix cifs failing to load on server kernels (mga#29957)
- fix broken plymouth scaling (mga#29925)
- bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
- fs/exec: require argv[0] presence in do_execveat_common()

For other upstream fixes, see the referenced changelogs.


- 8/core/kernel-5.15.18-2.mga8
- 8/core/kmod-virtualbox-6.1.32-1.4.mga8
- 8/core/kmod-xtables-addons-3.18-1.52.mga8