MGASA-2022-0063 - Updated kernel-linus packages fix security vulnerabilities

Publication date: 15 Feb 2022
URL: https://advisories.mageia.org/MGASA-2022-0063.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-0435,
     CVE-2022-0492,
     CVE-2022-24122,
     CVE-2022-24448

This kernel-linus update is based on upstream 5.15.23 and fixes atleast
the following security issues:

A stack overflow flaw was found in the Linux kernel TIPC protocol
functionality in the way a user sends a packet with malicious content
where the number of domain member nodes is higher than the 64 allowed.
This flaw allows a remote user to crash the system or possibly escalate
their privileges if they have access to the TIPC network (CVE-2022-0435).

A vulnerability was found in the Linux kernel cgroup_release_agent_write
in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain
circumstances, allows the use of the cgroups v1 release_agent feature to
escalate privileges and bypass the namespace isolation unexpectedly
(CVE-2022-0492).

kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged
user namespaces are enabled, allows a use-after-free and privilege
escalation because a ucounts object can outlive its namespace
(CVE-2022-24122).

An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5.
If an application sets the O_DIRECTORY flag, and tries to open a regular
file, nfs_atomic_open() performs a regular lookup. If a regular file is
found, ENOTDIR should occur, but the server instead returns uninitialized
data in the file descriptor (CVE-2022-24448).

Other fixes in this update:
- enable several missed MediaTek wifi drivers (mga#29965)

For other upstream fixes, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=30031
- https://bugs.mageia.org/show_bug.cgi?id=29965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448

SRPMS:
- 8/core/kernel-linus-5.15.23-1.mga8

Mageia 2022-0063: kernel-linus security update

This kernel-linus update is based on upstream 5.15.23 and fixes atleast the following security issues: A stack overflow flaw was found in the Linux kernel TIPC protocol functional...

Summary

This kernel-linus update is based on upstream 5.15.23 and fixes atleast the following security issues:
A stack overflow flaw was found in the Linux kernel TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network (CVE-2022-0435).
A vulnerability was found in the Linux kernel cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly (CVE-2022-0492).
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace (CVE-2022-24122).
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor (CVE-2022-24448).
Other fixes in this update: - enable several missed MediaTek wifi drivers (mga#29965)
For other upstream fixes, see the referenced changelogs.

References

- https://bugs.mageia.org/show_bug.cgi?id=30031

- https://bugs.mageia.org/show_bug.cgi?id=29965

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24122

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448

Resolution

MGASA-2022-0063 - Updated kernel-linus packages fix security vulnerabilities

SRPMS

- 8/core/kernel-linus-5.15.23-1.mga8

Severity
Publication date: 15 Feb 2022
URL: https://advisories.mageia.org/MGASA-2022-0063.html
Type: security
CVE: CVE-2022-0435, CVE-2022-0492, CVE-2022-24122, CVE-2022-24448

Related News