This kernel update is based on upstream 5.15.50 and fixes at least the following security issues: Incomplete cleanup of multi-core shared buffers for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21123). Incomplete cleanup of microarchitectural fill buffers on some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21125). Incomplete cleanup in specific special register read operations for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21127, CVE-2022-21166). For other upstream fixes, see the referenced changelogs.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | kernel | < 5.15.50-1 | kernel-5.15.50-1.mga8 |
Mageia | 8 | noarch | kmod-virtualbox | < 6.1.34-1.20 | kmod-virtualbox-6.1.34-1.20.mga8 |
Mageia | 8 | noarch | kmod-xtables-addons | < 3.20-1.20 | kmod-xtables-addons-3.20-1.20.mga8 |
bugs.mageia.org/show_bug.cgi?id=30563
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.47
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.48
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.49
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.50
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html