Description: | Summary: The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2022-0063 advisory.
Vulnerability Insight: This kernel-linus update is based on upstream 5.15.23 and fixes at least the following security issues:
A stack overflow flaw was found in the Linux kernel TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network (CVE-2022-0435).
A vulnerability was found in the Linux kernel cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly (CVE-2022-0492).
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace (CVE-2022-24122).
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor (CVE-2022-24448).
Other fixes in this update: - enable several missed MediaTek wifi drivers (mga#29965)
For other upstream fixes, see the referenced changelogs.
Affected Software/OS: 'kernel-linus' package(s) on Mageia 8.
Solution: Please install the updated package(s).
CVSS Score: 9.0
CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
|