Lucene search

K
mageiaGentoo FoundationMGASA-2022-0305
HistoryAug 26, 2022 - 12:21 a.m.

Updated kernel packages fix security vulnerabilities

2022-08-2600:21:07
Gentoo Foundation
advisories.mageia.org
53

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

20.5%

This kernel update is based on upstream 5.15.62 and fixes at least the following security issues: A use-after-free flaw was found in the Linux kernel Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system (CVE-2022-1679). A use-after-free flaw was found in the Linux kernel’s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system (CVE-2022-2585). A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation (CVE-2022-2586). A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local, privileged attacker to crash the system, possibly leading to a local privilege escalation issue (CVE-2022-2588). A flaw was found in hw. In certain processors with Intel’s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction (CVE-2022-26373). x86/bugs: Enable STIBP for IBPB mitigated RETBleed. Other fixes in this update: - add support for more tcp congestion control algos (mga #30725) - add fixes for a serious bug that causes TCP connection hangs for users of TCP fast open and nf_conntrack - ALSA: info: Fix llseek return value when using callback - ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU - ata: libata-eh: Add missing command name - btrfs: fix lost error handling when looking up extended ref on log repla - btrfs: reset RO counter on block group if we fail to relocate - btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() - drm/amd/display: Check correct bounds for stream encoder instances for DCN303 - drm/nouveau: recognise GA103 - drm/ttm: Fix dummy res NULL ptr deref bug - locking/atomic: Make test_and__bit() ordered on failure - mmc: meson-gx: Fix an error handling path in meson_mmc_probe() - mmc: pxamci: Fix an error handling path in pxamci_probe() - mmc: pxamci: Fix another error handling path in pxamci_probe() - rds: add missing barrier to release_refill - KVM: Unconditionally get a ref to /dev/kvm module when creating a VM - x86/mm: Use proper mask when setting PUD mapping - x86/entry: Fix entry_INT80_compat for Xen PV guests - x86/PAT: Have pat_enabled() properly reflect state when running on Xen - xfs: flush inodegc workqueue tasks before cancel - xfs: reserve quota for dir expansion when linking/unlinking files - xfs: reserve quota for target dir expansion when renaming files - xfs: remove infinite loop when reserving free block pool - xfs: always succeed at setting the reserve pool size - xfs: fix overfilling of reserve pool - xfs: fix soft lockup via spinning in filestream ag selection loop - xfs: revert “xfs: actually bump warning counts when we send warnings” - xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP xtables-addons have been updated to 3.21. For other upstream fixes in this update, see the referenced changelogs.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

20.5%