Mageia 2023-0250: kernel security update
Summary
This kernel update is based on upstream 5.15.126 and fixes or
adds mitigations for atleast the following security issues:
Information exposure through microarchitectural state after transient
execution in certain vector execution units for some Intel(R) Processors
may allow an authenticated user to potentially enable information disclosure
via local access (CVE-2022-40982, INTEL-SA-00828).
A hash collision flaw was found in the IPv6 connection lookup table in
the Linux kernelâs IPv6 functionality when a user makes a new kind of SYN
flood attack. A user located in the local network or with a high bandwidth
connection can increase the CPU usage of the server that accepts IPV6
connections up to 95% (CVE-2023-1206).
A use-after-free flaw was found in the Linux kernel's netfilter in the
way a user triggers the nft_pipapo_remove function with the element,
without a NFT_SET_EXT_KEY_END. This issue could allow a local user to
crash the system or potentially escalate their privileges on...
References
- https://bugs.mageia.org/show_bug.cgi?id=32168
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
- https://xenbits.xen.org/xsa/advisory-432.html
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.123
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.124
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.125
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
Resolution
MGASA-2023-0250 - Updated kernel packages fix security vulnerabilities
SRPMS
- 8/core/kernel-5.15.126-1.mga8
- 8/core/kmod-virtualbox-7.0.10-1.4.mga8
- 8/core/kmod-xtables-addons-3.23-1.26.mga8