MGASA-2023-0149 - Updated kernel-linus packages fix security vulnerability

Publication date: 17 Apr 2023
URL: https://advisories.mageia.org/MGASA-2023-0149.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2023-1076,
     CVE-2023-1077,
     CVE-2023-1079,
     CVE-2023-1118,
     CVE-2023-1611,
     CVE-2023-1670,
     CVE-2023-1829,
     CVE-2023-1855,
     CVE-2023-1989,
     CVE-2023-1990,
     CVE-2022-4269,
     CVE-2022-4379,
     CVE-2023-25012,
     CVE-2023-28466,
     CVE-2023-30456,
     CVE-2023-30772

This kernel-linus update is based on upstream 5.15.106 and fixes atleast the
following security issues:

A flaw was found in the Linux Kernel. The tun/tap sockets have their socket
UID hardcoded to 0 due to a type confusion in their initialization function.
While it will be often correct, as tuntap devices require CAP_NET_ADMIN,
it may not always be the case, e.g., a non-root user only having that
capability. This would make tun/tap sockets being incorrectly treated in
filtering/routing decisions, possibly bypassing network filters(CVE-2023-1076).

In the Linux kernel, pick_next_rt_entity() may return a type confused entry,
not detected by the BUG_ON condition, as the confused entry will not be
NULL, but list_head.The buggy error condition would lead to a type confused
entry with the list head,which would then be used as a type confused
sched_rt_entity,causing memory corruption (CVE-2023-1077).

A flaw was found in the Linux kernel. A use-after-free may be triggered in
asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device,
which advertises itself as an Asus device. Similarly to the previous known
CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the
LED controller while the device is disconnecting, triggering a use-after-free
on the struct asus_kbd_leds *led structure. A malicious USB device may
exploit the issue to cause memory corruption with controlled data
(CVE-2023-1079).

A flaw use after free in the Linux kernel integrated infrared receiver/
transceiver driver was found in the way user detaching rc device. A local
user could use this flaw to crash the system or potentially escalate their
privileges on the system (CVE-2023-1118).

A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c
in btrfs in the Linux Kernel.This flaw allows an attacker to crash the
system and possibly cause a kernel information leak (CVE-2023-1611).

A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card)
Ethernet driver was found.A local user could use this flaw to crash the
system or potentially escalate their privileges on the system
(CVE-2023-1670).

A use-after-free vulnerability in the Linux Kernel traffic control index
filter (tcindex) can be exploited to achieve local privilege escalation.
The tcindex_delete function which does not properly deactivate filters in
case of a perfect hashes while deleting the underlying structure which can
later lead to double freeing the structure. A local attacker user can use
this vulnerability to elevate its privileges to root (CVE-2023-1829).

A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/
xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon).
This flaw could allow a local attacker to crash the system due to a race
problem. This vulnerability could even lead to a kernel information leak
problem (CVE-2023-1855).

A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\
btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with
an unfinished job, may cause a race problem leading to a UAF on hdev
devices (CVE-2023-1989).

A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c
in the Linux Kernel. This flaw could allow an attacker to crash the system
due to a race problem (CVE-2023-1990).

A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using
a specific networking configuration (redirecting egress packets to ingress
using TC action "mirred") a local unprivileged user could trigger a CPU
soft lockup (ABBA deadlock) when the transport protocol in use (TCP or
SCTP) does a retransmission, resulting in a denial of service condition
(CVE-2022-4269).

A use-after-free vulnerability was found in __nfs42_ssc_open() in
fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
conduct a remote denial of service (CVE-2022-4379).

The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in
drivers/hid/hid-bigbenff.c via a crafted USB device because the LED
controllers remain registered for too long (CVE-2023-25012).

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6
lacks a lock_sock call, leading to a race condition (with a resultant
use-after-free or NULL pointer dereference) (CVE-2023-28466).

An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel
before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4
(CVE-2023-30456).

The Linux kernel before 6.2.9 has a race condition and resultant
use-after-free in drivers/power/supply/da9150-charger.c if a physically
proximate attacker unplugs a device (CVE-2023-30772).

For other upstream fixes in this update, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=31778
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.99
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.100
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.101
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.102
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.103
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.104
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.105
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1670
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1990
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30772

SRPMS:
- 8/core/kernel-linus-5.15.106-1.mga8

Mageia 2023-0149: kernel-linus security update

This kernel-linus update is based on upstream 5.15.106 and fixes atleast the following security issues: A flaw was found in the Linux Kernel

Summary

This kernel-linus update is based on upstream 5.15.106 and fixes atleast the following security issues:
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters(CVE-2023-1076).
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption (CVE-2023-1077).
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data (CVE-2023-1079).
A flaw use after free in the Linux kernel integrated infrared receiver/ transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (CVE-2023-1118).
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information leak (CVE-2023-1611).
A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system (CVE-2023-1670).
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root (CVE-2023-1829).
A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/ xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem (CVE-2023-1855).
A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\ btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices (CVE-2023-1989).
A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem (CVE-2023-1990).
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition (CVE-2022-4269).
A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service (CVE-2022-4379).
The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long (CVE-2023-25012).
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference) (CVE-2023-28466).
An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4 (CVE-2023-30456).
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device (CVE-2023-30772).
For other upstream fixes in this update, see the referenced changelogs.

References

- https://bugs.mageia.org/show_bug.cgi?id=31778

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.99

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.100

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.101

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.102

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.103

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.104

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.105

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.106

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1670

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1990

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30772

Resolution

MGASA-2023-0149 - Updated kernel-linus packages fix security vulnerability

SRPMS

- 8/core/kernel-linus-5.15.106-1.mga8

Severity
Publication date: 17 Apr 2023
URL: https://advisories.mageia.org/MGASA-2023-0149.html
Type: security
CVE: CVE-2023-1076, CVE-2023-1077, CVE-2023-1079, CVE-2023-1118, CVE-2023-1611, CVE-2023-1670, CVE-2023-1829, CVE-2023-1855, CVE-2023-1989, CVE-2023-1990, CVE-2022-4269, CVE-2022-4379, CVE-2023-25012, CVE-2023-28466, CVE-2023-30456, CVE-2023-30772

Related News