{"id":"MGASA-2022-0242","summary":"Updated kernel packages fix security vulnerabilities","details":"This kernel update is based on upstream 5.15.50 and fixes at least the\nfollowing security issues:\n\nIncomplete cleanup of multi-core shared buffers for some Intel Processors\nmay allow an authenticated user to potentially enable information disclosure\nvia local access (CVE-2022-21123).\n\nIncomplete cleanup of microarchitectural fill buffers on some Intel\nProcessors may allow an authenticated user to potentially enable information\ndisclosure via local access (CVE-2022-21125).\n\nIncomplete cleanup in specific special register read operations for some\nIntel Processors may allow an authenticated user to potentially enable\ninformation disclosure via local access (CVE-2022-21127, CVE-2022-21166).\n\nFor other upstream fixes, see the referenced changelogs.\n","modified":"2026-01-30T09:25:48.555263Z","published":"2022-06-29T16:18:17Z","related":["CVE-2022-21123","CVE-2022-21125","CVE-2022-21127","CVE-2022-21166"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0242.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30563"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.47"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.48"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.49"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.50"},{"type":"REPORT","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.50-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0242.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.34-1.20.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0242.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20-1.20.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0242.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}