Mageia 2023-0088: kernel-linus security update
Summary
This kernel-linus update is based on upstream 5.15.98 and fixes atleast the
following security issues:
A regression exists in the Linux Kernel within KVM: nVMX that allowed for
speculative execution attacks. L2 can carry out Spectre v2 attacks on L1
due to L1 thinking it doesn't need retpolines or IBPB after running L2
due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with
code execution can execute code on an indirect branch on the host machine
(CVE-2022-2196).
A double-free memory flaw was found in the Linux kernel. The Intel GVT-g
graphics driver triggers VGA card system resource overload, causing a
fail in the intel_gvt_dma_map_guest_page function. This issue could allow
a local user to crash the system (CVE-2022-3707).
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP).
A missing lock when clearing sk_user_data can lead to a race condition
and NULL pointer dereference. A local user could use this flaw to
potentially crash the system causin...
References
- https://bugs.mageia.org/show_bug.cgi?id=31632
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.89
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.90
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.91
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.92
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.93
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.94
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.95
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.96
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.97
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.98
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4842
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23559
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545
Resolution
MGASA-2023-0088 - Updated kernel-linus packages fix security vulnerabilities
SRPMS
- 8/core/kernel-linus-5.15.98-1.mga8