Mageia 2023-0173: kernel-linus security update
Summary
This kernel-linus update is based on upstream 5.15.110 and fixes atleast
the following security issues:
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
This issue could occur when assoc_info->req_len data is bigger than the
size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of
service (CVE-2023-1380).
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service or expose sensitive information (CVE-2023-1859).
An insufficient permission check has been found in the Bluetooth subsystem
of the Linux kernel when handling ioctl system calls of HCI sockets.
This causes tasks without the proper CAP_NET_ADMIN capability can easily
mark HCI sockets as _trusted_. Trusted sockets are intended to enable the
sending...
References
- https://bugs.mageia.org/show_bug.cgi?id=31876
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.107
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.108
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.109
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
Resolution
MGASA-2023-0173 - Updated kernel-linus packages fix security vulnerabilities
SRPMS
- 8/core/kernel-linus-5.15.110-1.mga8