MGASA-2022-0026

Source
https://advisories.mageia.org/MGASA-2022-0026.html
Import Source
https://advisories.mageia.org/MGASA-2022-0026.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0026
Related
Published
2022-01-21T21:41:23Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel packages fix security vulnerability
Details

This kernel update is based on upstream 5.15.16 and fixes at least the following security issue:

William Liu and Jamie Hill-Daniel discovered that the file system context functionality in the Linux kernel contained an integer underflow vulnerability, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code (CVE-2022-0185).

References
Credits

Affected packages

Mageia:8 / kernel

Package

Name
kernel
Purl
pkg:rpm/mageia/kernel?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.16-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / kmod-virtualbox

Package

Name
kmod-virtualbox
Purl
pkg:rpm/mageia/kmod-virtualbox?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.30-1.14.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / kmod-xtables-addons

Package

Name
kmod-xtables-addons
Purl
pkg:rpm/mageia/kmod-xtables-addons?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.18-1.48.mga8

Ecosystem specific

{
    "section": "core"
}