Security and bugfixes, advisory will follow... SRPMS: kernel-linus-5.15.110-1.mga8.src.rpm i586: kernel-linus-5.15.110-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-5.15.110-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-latest-5.15.110-1.mga8.i586.rpm kernel-linus-doc-5.15.110-1.mga8.noarch.rpm kernel-linus-latest-5.15.110-1.mga8.i586.rpm kernel-linus-source-5.15.110-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.110-1.mga8.noarch.rpm x86_64: kernel-linus-5.15.110-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-5.15.110-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-latest-5.15.110-1.mga8.x86_64.rpm kernel-linus-doc-5.15.110-1.mga8.noarch.rpm kernel-linus-latest-5.15.110-1.mga8.x86_64.rpm kernel-linus-source-5.15.110-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.110-1.mga8.noarch.rpm
advisory, addded to svn... type: security subject: Updated kernel-linus packages fix security vulnerabilities CVE: - CVE-2023-1380 - CVE-2023-1859 - CVE-2023-2002 - CVE-2023-2248 - CVE-2023-31436 src: 8: core: - kernel-linus-5.15.110-1.mga8 description: | This kernel-linus update is based on upstream 5.15.110 and fixes atleast the following security issues: A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service (CVE-2023-1380). It was discovered that a race condition existed in the Xen transport layer implementation for the 9P file system protocol in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or expose sensitive information (CVE-2023-1859). An insufficient permission check has been found in the Bluetooth subsystem of the Linux kernel when handling ioctl system calls of HCI sockets. This causes tasks without the proper CAP_NET_ADMIN capability can easily mark HCI sockets as _trusted_. Trusted sockets are intended to enable the sending and receiving of management commands and events, such as pairing or connecting with a new device. As a result, unprivileged users can acquire a trusted socket, leading to unauthorized execution of management commands (CVE-2023-2002). A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic control (QoS) subsystem can be exploited to achieve local privilege escalation. The qfq_change_class function does not properly limit the lmax variable which can lead to out-of-bounds read/write. If the TCA_QFQ_LMAX value is not offered through nlattr, lmax is determined by the MTU value of the network device. The MTU of the loopback device can be set up to 2^31-1 and as a result, it is possible to have an lmax value that exceeds QFQ_MIN_LMAX (CVE-2023-2248). qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX (CVE-2023-31436). For other upstream fixes in this update, see the referenced changelogs. references: - https://bugs.mageia.org/show_bug.cgi?id=31876 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.107 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.108 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.109 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.110
Keywords: (none) => advisory
Intel i5-2500, Intel graphics, wired Internet connection (rtl8192eu driver also installed), mga8-64 Xfce system. Installed kernel-linus-latest and kernel-linus-devel-latest and dependencies, with no issues. Rtl8192eu module built and installed successfully. After being sure to reboot into kernel-linus, I tried this and that, with no issues apparent. Looks OK on this system.
CC: (none) => andrewsfarm
Whiteboard: (none) => MGA8-64-OKKeywords: (none) => validated_updateCC: (none) => sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0173.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED