Mageia 2023-0087: kernel security update
Summary
This kernel update is based on upstream 5.15.98 and fixes atleast the
following security issues:
A regression exists in the Linux Kernel within KVM: nVMX that allowed for
speculative execution attacks. L2 can carry out Spectre v2 attacks on L1
due to L1 thinking it doesn't need retpolines or IBPB after running L2
due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with
code execution can execute code on an indirect branch on the host machine
(CVE-2022-2196).
A double-free memory flaw was found in the Linux kernel. The Intel GVT-g
graphics driver triggers VGA card system resource overload, causing a
fail in the intel_gvt_dma_map_guest_page function. This issue could allow
a local user to crash the system (CVE-2022-3707).
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP).
A missing lock when clearing sk_user_data can lead to a race condition
and NULL pointer dereference. A local user could use this flaw to
potentially crash the system causing a de...
References
- https://bugs.mageia.org/show_bug.cgi?id=31631
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.89
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.90
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.91
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.92
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.93
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.94
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.95
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.96
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.97
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.98
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4842
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23559
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545
Resolution
MGASA-2023-0087 - Updated kernel packages fix security vulnerabilities
SRPMS
- 8/core/kernel-5.15.98-1.mga8
- 8/core/kmod-virtualbox-7.0.6-1.6.mga8
- 8/core/kmod-xtables-addons-3.23-1.8.mga8