Bug 31876 - Update request: kernel-linus-5.15.110-1.mga8
Summary: Update request: kernel-linus-5.15.110-1.mga8
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2023-05-06 21:07 CEST by Thomas Backlund
Modified: 2023-05-19 09:24 CEST (History)
2 users (show)

See Also:
Source RPM: kernel-linus
CVE:
Status comment:


Attachments

Description Thomas Backlund 2023-05-06 21:07:22 CEST
Security and bugfixes, advisory will follow...


SRPMS:
kernel-linus-5.15.110-1.mga8.src.rpm



i586:
kernel-linus-5.15.110-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-5.15.110-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-latest-5.15.110-1.mga8.i586.rpm
kernel-linus-doc-5.15.110-1.mga8.noarch.rpm
kernel-linus-latest-5.15.110-1.mga8.i586.rpm
kernel-linus-source-5.15.110-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.110-1.mga8.noarch.rpm



x86_64:
kernel-linus-5.15.110-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-5.15.110-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-latest-5.15.110-1.mga8.x86_64.rpm
kernel-linus-doc-5.15.110-1.mga8.noarch.rpm
kernel-linus-latest-5.15.110-1.mga8.x86_64.rpm
kernel-linus-source-5.15.110-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.110-1.mga8.noarch.rpm
Comment 1 Thomas Backlund 2023-05-06 21:53:27 CEST
advisory,  addded to svn...

type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
 - CVE-2023-1380
 - CVE-2023-1859
 - CVE-2023-2002
 - CVE-2023-2248
 - CVE-2023-31436
src:
  8:
   core:
     - kernel-linus-5.15.110-1.mga8
description: |
  This kernel-linus update is based on upstream 5.15.110 and fixes atleast
  the following security issues:

  A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in
  drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
  This issue could occur when assoc_info->req_len data is bigger than the
  size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of
  service (CVE-2023-1380).

  It was discovered that a race condition existed in the Xen transport layer
  implementation for the 9P file system protocol in the Linux kernel, leading
  to a use-after-free vulnerability. A local attacker could use this to cause
  a denial of service or expose sensitive information (CVE-2023-1859).

  An insufficient permission check has been found in the Bluetooth subsystem
  of the Linux kernel when handling ioctl system calls of HCI sockets.
  This causes tasks without the proper CAP_NET_ADMIN capability can easily
  mark HCI sockets as _trusted_. Trusted sockets are intended to enable the
  sending and receiving of management commands and events, such as pairing
  or connecting with a new device.  As a result, unprivileged users can
  acquire a trusted socket, leading to unauthorized execution of management
  commands (CVE-2023-2002).

  A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic
  control (QoS) subsystem can be exploited to achieve local privilege
  escalation. The qfq_change_class function does not properly limit the lmax
  variable which can lead to out-of-bounds read/write. If the TCA_QFQ_LMAX
  value is not offered through nlattr, lmax is determined by the MTU value
  of the network device. The MTU of the loopback device can be set up to
  2^31-1 and as a result, it is possible to have an lmax value that exceeds
  QFQ_MIN_LMAX (CVE-2023-2248).

  qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13
  allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX
  (CVE-2023-31436).

  For other upstream fixes in this update, see the referenced changelogs.
references:
 - https://bugs.mageia.org/show_bug.cgi?id=31876
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.107
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.108
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.109
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.110

Keywords: (none) => advisory

Comment 2 Thomas Andrews 2023-05-19 01:47:42 CEST
Intel i5-2500, Intel graphics, wired Internet connection (rtl8192eu driver also installed), mga8-64 Xfce system.

Installed kernel-linus-latest and kernel-linus-devel-latest and dependencies, with no issues. Rtl8192eu module built and installed successfully.

After being sure to reboot into kernel-linus, I tried this and that, with no issues apparent. Looks OK on this system.

CC: (none) => andrewsfarm

Thomas Backlund 2023-05-19 07:48:30 CEST

Whiteboard: (none) => MGA8-64-OK
Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 3 Mageia Robot 2023-05-19 09:24:21 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2023-0173.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.