MGASA-2023-0166 - Updated kernel packages fix security vulnerabilities

Publication date: 16 May 2023
URL: https://advisories.mageia.org/MGASA-2023-0166.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2023-1380,
     CVE-2023-1859,
     CVE-2023-2002,
     CVE-2023-2248,
     CVE-2023-31436,
     CVE-2023-32233

This kernel update is based on upstream 5.15.110 and fixes atleast the
following security issues:

A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
This issue could occur when assoc_info->req_len data is bigger than the
size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of
service (CVE-2023-1380).

It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service or expose sensitive information (CVE-2023-1859).

An insufficient permission check has been found in the Bluetooth subsystem
of the Linux kernel when handling ioctl system calls of HCI sockets.
This causes tasks without the proper CAP_NET_ADMIN capability can easily
mark HCI sockets as _trusted_. Trusted sockets are intended to enable the
sending and receiving of management commands and events, such as pairing
or connecting with a new device.  As a result, unprivileged users can
acquire a trusted socket, leading to unauthorized execution of management
commands (CVE-2023-2002).

A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic
control (QoS) subsystem can be exploited to achieve local privilege
escalation. The qfq_change_class function does not properly limit the lmax
variable which can lead to out-of-bounds read/write. If the TCA_QFQ_LMAX
value is not offered through nlattr, lmax is determined by the MTU value
of the network device. The MTU of the loopback device can be set up to
2^31-1 and as a result, it is possible to have an lmax value that exceeds
QFQ_MIN_LMAX (CVE-2023-2248).

qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13
allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX
(CVE-2023-31436).

Linux kernel use-after-free in Netfilter nf_tables when processing batch
requests can be abused to perform arbitrary reads and writes in kernel
memory. An unprivilegied local user can exploit this to start a local 
root shell (CVE-2023-32233).

For other upstream fixes in this update, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=31875
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.107
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.108
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.109
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233

SRPMS:
- 8/core/kernel-5.15.110-2.mga8
- 8/core/kmod-virtualbox-7.0.8-1.2.mga8
- 8/core/kmod-xtables-addons-3.23-1.14.mga8

Mageia 2023-0166: kernel security update

This kernel update is based on upstream 5.15.110 and fixes atleast the following security issues: A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/...

Summary

This kernel update is based on upstream 5.15.110 and fixes atleast the following security issues:
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service (CVE-2023-1380).
It was discovered that a race condition existed in the Xen transport layer implementation for the 9P file system protocol in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or expose sensitive information (CVE-2023-1859).
An insufficient permission check has been found in the Bluetooth subsystem of the Linux kernel when handling ioctl system calls of HCI sockets. This causes tasks without the proper CAP_NET_ADMIN capability can easily mark HCI sockets as _trusted_. Trusted sockets are intended to enable the sending and receiving of management commands and events, such as pairing or connecting with a new device. As a result, unprivileged users can acquire a trusted socket, leading to unauthorized execution of management commands (CVE-2023-2002).
A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic control (QoS) subsystem can be exploited to achieve local privilege escalation. The qfq_change_class function does not properly limit the lmax variable which can lead to out-of-bounds read/write. If the TCA_QFQ_LMAX value is not offered through nlattr, lmax is determined by the MTU value of the network device. The MTU of the loopback device can be set up to 2^31-1 and as a result, it is possible to have an lmax value that exceeds QFQ_MIN_LMAX (CVE-2023-2248).
qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX (CVE-2023-31436).
Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory. An unprivilegied local user can exploit this to start a local root shell (CVE-2023-32233).
For other upstream fixes in this update, see the referenced changelogs.

References

- https://bugs.mageia.org/show_bug.cgi?id=31875

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.107

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.108

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.109

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.110

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2248

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233

Resolution

MGASA-2023-0166 - Updated kernel packages fix security vulnerabilities

SRPMS

- 8/core/kernel-5.15.110-2.mga8

- 8/core/kmod-virtualbox-7.0.8-1.2.mga8

- 8/core/kmod-xtables-addons-3.23-1.14.mga8

Severity
Publication date: 16 May 2023
URL: https://advisories.mageia.org/MGASA-2023-0166.html
Type: security
CVE: CVE-2023-1380, CVE-2023-1859, CVE-2023-2002, CVE-2023-2248, CVE-2023-31436, CVE-2023-32233

Related News