Lucene search

K
mageiaGentoo FoundationMGASA-2022-0213
HistoryMay 28, 2022 - 11:56 a.m.

Updated kernel-linus packages fix security vulnerabilities

2022-05-2811:56:13
Gentoo Foundation
advisories.mageia.org
33

0.0004 Low

EPSS

Percentile

15.0%

This kernel-linus update is based on upstream 5.15.43 and fixes at least the following security issues: A race condition in the perf subsystem allows for a local privilege escalation. NOTE: Mageia kernels by default has disabled the perf usage for unprivileged users, effectively rendering this vulnerability harmless (CVE-2022-1729). Kernel could allow a remote attacker to bypass security restrictions, caused by a lockdown break issue. By sending a specially-crafted request using the kernel debugger, an attacker could exploit this vulnerability to perform read and write access to kernel memory (CVE-2022-21499). For other upstream fixes, see the referenced changelogs.

OSVersionArchitecturePackageVersionFilename
Mageia8noarchkernel-linus< 5.15.43-1kernel-linus-5.15.43-1.mga8