MGASA-2022-0062 - Updated kernel packages fix security vulnerabilities

Publication date: 15 Feb 2022
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-0435,

This kernel update is based on upstream 5.15.23 and fixes atleast the
following security issues:

A stack overflow flaw was found in the Linux kernel TIPC protocol
functionality in the way a user sends a packet with malicious content
where the number of domain member nodes is higher than the 64 allowed.
This flaw allows a remote user to crash the system or possibly escalate
their privileges if they have access to the TIPC network (CVE-2022-0435).

A vulnerability was found in the Linux kernel cgroup_release_agent_write
in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain
circumstances, allows the use of the cgroups v1 release_agent feature to
escalate privileges and bypass the namespace isolation unexpectedly

An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5.
If an application sets the O_DIRECTORY flag, and tries to open a regular
file, nfs_atomic_open() performs a regular lookup. If a regular file is
found, ENOTDIR should occur, but the server instead returns uninitialized
data in the file descriptor (CVE-2022-24448).

Other fixes in this update:
- enable several missed MediaTek wifi drivers (mga#29965)

For other upstream fixes, see the referenced changelogs.


- 8/core/kernel-5.15.23-1.mga8
- 8/core/kmod-virtualbox-6.1.32-1.6.mga8
- 8/core/kmod-xtables-addons-3.18-1.56.mga8