logo
DATABASE RESOURCES PRICING ABOUT US

Updated kernel packages fix security vulnerabilities

Description

This kernel update is based on upstream 5.15.43 and fixes at least the following security issues: A race condition in the perf subsystem allows for a local privilege escalation. NOTE: Mageia kernels by default has disabled the perf usage for unprivileged users, effectively rendering this vulnerability harmless (CVE-2022-1729). KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID (CVE-2022-1789). Kernel could allow a remote attacker to bypass security restrictions, caused by a lockdown break issue. By sending a specially-crafted request using the kernel debugger, an attacker could exploit this vulnerability to perform read and write access to kernel memory (CVE-2022-21499). Other fixes in this update: \- ice: fix crash at allocation failure For other upstream fixes, see the referenced changelogs.


Affected Package


OS OS Version Package Name Package Version
Mageia 8 kernel 5.15.43-1
Mageia 8 kmod-virtualbox 6.1.34-1.8
Mageia 8 kmod-xtables-addons 3.20-1.4

Related