MGASA-2023-0243 - Updated kernel-linus packages fix security vulnerabilities

Publication date: 26 Jul 2023
URL: https://advisories.mageia.org/MGASA-2023-0243.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2023-20593,
     CVE-2023-31248,
     CVE-2023-35001

This kernel-linus update is based on upstream 5.15.122 and fixes atleast
the following security issues:

Under specific microarchitectural circumstances, a register in "Zen 2"
CPUs may not be written to 0 correctly. This may cause data from another
process and/or thread to be stored in the YMM register, which may allow
an attacker to potentially access sensitive information (CVE-2023-20593,
also known as Zenbleed).

This update adds a kernel-side mitigation for this issue to protect users
until Amd gets their fixed microcode / AGESA updates out for all affected
CPUs. The fixed microcode for Amd EPYC gen2 is available in the
microcode-0.20230613-2.mga8.nonfree package. For other affected CPUs, see
the referenced amd.com url that has info about estimated microcode update
timelines for various CPUs.

Linux Kernel nftables Use-After-Free Local Privilege Escalation
Vulnerability; nft_chain_lookup_byid() failed to check whether a chain
was active and CAP_NET_ADMIN is in any user or network namespace 
(CVE-2023-31248).

Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability;
nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN
is in any user or network namespace (CVE-2023-35001).

For other upstream fixes in this update, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=32140
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.121
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.122
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001

SRPMS:
- 8/core/kernel-linus-5.15.122-1.mga8

Mageia 2023-0243: kernel-linus security update

This kernel-linus update is based on upstream 5.15.122 and fixes atleast the following security issues: Under specific microarchitectural circumstances, a register in "Zen 2" CPUs...

Summary

This kernel-linus update is based on upstream 5.15.122 and fixes atleast the following security issues:
Under specific microarchitectural circumstances, a register in "Zen 2" CPUs may not be written to 0 correctly. This may cause data from another process and/or thread to be stored in the YMM register, which may allow an attacker to potentially access sensitive information (CVE-2023-20593, also known as Zenbleed).
This update adds a kernel-side mitigation for this issue to protect users until Amd gets their fixed microcode / AGESA updates out for all affected CPUs. The fixed microcode for Amd EPYC gen2 is available in the microcode-0.20230613-2.mga8.nonfree package. For other affected CPUs, see the referenced amd.com url that has info about estimated microcode update timelines for various CPUs.
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; nft_chain_lookup_byid() failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace (CVE-2023-31248).
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace (CVE-2023-35001).
For other upstream fixes in this update, see the referenced changelogs.

References

- https://bugs.mageia.org/show_bug.cgi?id=32140

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.121

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.122

- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001

Resolution

MGASA-2023-0243 - Updated kernel-linus packages fix security vulnerabilities

SRPMS

- 8/core/kernel-linus-5.15.122-1.mga8

Severity
Publication date: 26 Jul 2023
URL: https://advisories.mageia.org/MGASA-2023-0243.html
Type: security
CVE: CVE-2023-20593, CVE-2023-31248, CVE-2023-35001

Related News