MGASA-2023-0242 - Updated kernel packages fix security vulnerability

Publication date: 26 Jul 2023
URL: https://advisories.mageia.org/MGASA-2023-0242.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2023-20593

This kernel update is based on upstream 5.15.122 and fixes atleast
the following security issue:

Under specific microarchitectural circumstances, a register in "Zen 2"
CPUs may not be written to 0 correctly. This may cause data from another
process and/or thread to be stored in the YMM register, which may allow
an attacker to potentially access sensitive information (CVE-2023-20593,
also known as Zenbleed)

This update adds a kernel-side mitigation for this issue to protect users
until Amd gets their fixed microcode / AGESA updates out for all affected
CPUs. The fixed microcode for Amd EPYC gen2 is available in the
microcode-0.20230613-2.mga8.nonfree package. For other affected CPUs, see
the referenced amd.com url that has info about estimated microcode update
timelines for various CPUs.

For other upstream fixes in this update, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=32139
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.121
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.122
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593

SRPMS:
- 8/core/kernel-5.15.122-1.mga8
- 8/core/kmod-virtualbox-7.0.10-1.1.mga8
- 8/core/kmod-xtables-addons-3.23-1.23.mga8

Mageia 2023-0242: kernel security update

This kernel update is based on upstream 5.15.122 and fixes atleast the following security issue: Under specific microarchitectural circumstances, a register in "Zen 2" CPUs may no...

Summary

This kernel update is based on upstream 5.15.122 and fixes atleast the following security issue:
Under specific microarchitectural circumstances, a register in "Zen 2" CPUs may not be written to 0 correctly. This may cause data from another process and/or thread to be stored in the YMM register, which may allow an attacker to potentially access sensitive information (CVE-2023-20593, also known as Zenbleed)
This update adds a kernel-side mitigation for this issue to protect users until Amd gets their fixed microcode / AGESA updates out for all affected CPUs. The fixed microcode for Amd EPYC gen2 is available in the microcode-0.20230613-2.mga8.nonfree package. For other affected CPUs, see the referenced amd.com url that has info about estimated microcode update timelines for various CPUs.
For other upstream fixes in this update, see the referenced changelogs.

References

- https://bugs.mageia.org/show_bug.cgi?id=32139

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.121

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.122

- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593

Resolution

MGASA-2023-0242 - Updated kernel packages fix security vulnerability

SRPMS

- 8/core/kernel-5.15.122-1.mga8

- 8/core/kmod-virtualbox-7.0.10-1.1.mga8

- 8/core/kmod-xtables-addons-3.23-1.23.mga8

Severity
Publication date: 26 Jul 2023
URL: https://advisories.mageia.org/MGASA-2023-0242.html
Type: security
CVE: CVE-2023-20593

Related News