| Summary: | Update request: kernel-linus-5.15.110-1.mga8 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | kernel-linus | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2023-05-06 21:07:22 CEST
advisory, addded to svn...
type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
- CVE-2023-1380
- CVE-2023-1859
- CVE-2023-2002
- CVE-2023-2248
- CVE-2023-31436
src:
8:
core:
- kernel-linus-5.15.110-1.mga8
description: |
This kernel-linus update is based on upstream 5.15.110 and fixes atleast
the following security issues:
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
This issue could occur when assoc_info->req_len data is bigger than the
size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of
service (CVE-2023-1380).
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service or expose sensitive information (CVE-2023-1859).
An insufficient permission check has been found in the Bluetooth subsystem
of the Linux kernel when handling ioctl system calls of HCI sockets.
This causes tasks without the proper CAP_NET_ADMIN capability can easily
mark HCI sockets as _trusted_. Trusted sockets are intended to enable the
sending and receiving of management commands and events, such as pairing
or connecting with a new device. As a result, unprivileged users can
acquire a trusted socket, leading to unauthorized execution of management
commands (CVE-2023-2002).
A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic
control (QoS) subsystem can be exploited to achieve local privilege
escalation. The qfq_change_class function does not properly limit the lmax
variable which can lead to out-of-bounds read/write. If the TCA_QFQ_LMAX
value is not offered through nlattr, lmax is determined by the MTU value
of the network device. The MTU of the loopback device can be set up to
2^31-1 and as a result, it is possible to have an lmax value that exceeds
QFQ_MIN_LMAX (CVE-2023-2248).
qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13
allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX
(CVE-2023-31436).
For other upstream fixes in this update, see the referenced changelogs.
references:
- https://bugs.mageia.org/show_bug.cgi?id=31876
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.107
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.108
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.109
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.110Keywords:
(none) =>
advisory Intel i5-2500, Intel graphics, wired Internet connection (rtl8192eu driver also installed), mga8-64 Xfce system. Installed kernel-linus-latest and kernel-linus-devel-latest and dependencies, with no issues. Rtl8192eu module built and installed successfully. After being sure to reboot into kernel-linus, I tried this and that, with no issues apparent. Looks OK on this system. CC:
(none) =>
andrewsfarm
Thomas Backlund
2023-05-19 07:48:30 CEST
Whiteboard:
(none) =>
MGA8-64-OK An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0173.html Resolution:
(none) =>
FIXED |