/[advisories]/32537.adv
ViewVC logotype

Contents of /32537.adv

Parent Directory Parent Directory | Revision Log Revision Log


Revision 15276 - (show annotations) (download)
Mon Nov 20 21:24:38 2023 UTC (9 months, 3 weeks ago) by marja
File size: 4995 byte(s)
Add security advisory M9 kernel/kmod-virtualbox/kmod-xtables-addons mga#32537
1 type: security
2 subject: Updated kernel packages fix security vulnerabilities and other bugs
3 CVE:
4 - CVE-2023-5178
5 - CVE-2023-5090
6 - CVE-2023-34324
7 - CVE-2023-5345
8 - CVE-2023-39189
9 - CVE-2023-5633
10 - CVE-2023-5717
11 - CVE-2023-46813
12 src:
13 9:
14 core:
15 - kernel-6.5.11-5.mga9
16 - kmod-virtualbox-7.0.10-37.mga9
17 - kmod-xtables-addons-3.24-50.mga9
18 description: |
19 This kernel update is based on upstream 6.5.11 and fixes or adds
20 mitigations for at least the following security issues:
21
22 A use-after-free vulnerability was found in drivers/nvme/target/tcp.c`
23 in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP
24 subsystem in the Linux kernel. This issue may allow a malicious user to
25 cause a use-after-free and double-free problem, which may permit remote
26 code execution or lead to local privilege escalation in case that the
27 attacker already has local privileges. (CVE-2023-5178)
28
29 x86: KVM: SVM: always update the x2avic msr interception:
30 The following problem exists since x2avic was enabled in the KVM:
31 svm_set_x2apic_msr_interception is called to enable the interception of
32 the x2apic msrs.
33 In particular it is called at the moment the guest resets its apic.
34 Assuming that the guest's apic is in x2apic mode, the reset will bring
35 it back to the xapic mode.
36 The svm_set_x2apic_msr_interception however has an erroneous check for
37 '!apic_x2apic_mode()' which prevents it from doing anything in this case.
38 As a result of this, all x2apic msrs are left unintercepted, and that
39 exposes the bare metal x2apic (if enabled) to the guest.
40 Removing the erroneous '!apic_x2apic_mode()' check fixes that.
41 (CVE-2023-5090)
42
43 In unprivileged Xen guests event handling can cause a deadlock with
44 Xen console handling. The evtchn_rwlock and the hvc_lock are taken in
45 opposite sequence in __hvc_poll() and in Xen console IRQ handling.
46 This is fixed by xen/events: replace evtchn_rwlock with RCU
47 (CVE-2023-34324)
48
49 A use-after-free vulnerability in the Linux kernel's fs/smb/client
50 component can be exploited to achieve local privilege escalation. In
51 case of an error in smb3_fs_context_parse_param, ctx->password was freed
52 but the field was not set to NULL which could lead to double free. We
53 recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705
54 (CVE-2023-5345)
55
56 A flaw was found in the Netfilter subsystem in the Linux kernel. The
57 nfnl_osf_add_callback function did not validate the user mode controlled
58 opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN)
59 attacker to trigger an out-of-bounds read, leading to a crash or
60 information disclosure. (CVE-2023-39189)
61
62 The reference count changes made as part of the CVE-2023-33951 and
63 CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory
64 objects were handled when they were being used to store a surface. When
65 running inside a VMware guest with 3D acceleration enabled, a local,
66 unprivileged user could potentially use this flaw to escalate their
67 privileges. (CVE-2023-5633)
68
69 A heap out-of-bounds write vulnerability in the Linux kernel's Linux
70 Kernel Performance Events (perf) component can be exploited to achieve
71 local privilege escalation. If perf_read_group() is called while an
72 event's sibling_list is smaller than its child's sibling_list, it can
73 increment or write to memory locations outside of the allocated buffer.
74 We recommend upgrading past commit
75 32671e3799ca2e4590773fd0e63aaa4229e50c06. (CVE-2023-5717)
76
77 An issue was discovered in the Linux kernel before 6.5.9, exploitable by
78 local users with userspace access to MMIO registers. Incorrect access
79 checking in the #VC handler and instruction emulation of the SEV-ES
80 emulation of MMIO accesses could lead to arbitrary write access to
81 kernel memory (and thus privilege escalation). This depends on a race
82 condition through which userspace can replace an instruction before the
83 #VC handler reads it. (CVE-2023-46813)
84
85 And fixes at least one normal bug about sleep lockups:
86
87 Drop Patch1030 and 1050 to fix sleep lockups (bug #32082)
88
89 references:
90 - https://bugs.mageia.org/show_bug.cgi?id=32537
91 - https://bugs.mageia.org/show_bug.cgi?id=32082
92 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5
93 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.1
94 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.2
95 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3
96 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4
97 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.5
98 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.6
99 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.7
100 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.8
101 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
102 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.10
103 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.11
104

  ViewVC Help
Powered by ViewVC 1.1.30