Mageia 2023-0202: kernel-linus security update
Summary
This kernel-linus update is based on upstream 5.15.117 and fixes atleast
the following security issues:
In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree
because it does not validate MFT flags before replaying logs
(CVE-2022-48425).
A flaw was found in the networking subsystem of the Linux kernel within
the handling of the RPL protocol. This issue results from the lack of
proper handling of user-supplied data, which can lead to an assertion
failure. This may allow an unauthenticated remote attacker to create a
denial of service condition on the system (CVE-2023-2156).
A denial of service problem was found, due to a possible recursive locking
scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c
in the Linux Kernel Device Mapper-Multipathing sub-component
(CVE-2023-2269).
An issue was discovered in...
References
- https://bugs.mageia.org/show_bug.cgi?id=32002
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.111
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.112
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.113
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.114
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.115
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.116
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.117
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48425
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34256
Resolution
MGASA-2023-0202 - Updated kernel-linus packages fix security vulnerabilities
SRPMS
- 8/core/kernel-linus-5.15.117-1.mga8