Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2023.0331
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2023-0331)
Summary:The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2023-0331 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2023-0331 advisory.

Vulnerability Insight:
This kernel update is based on upstream 6.5.11 and fixes or adds
mitigations for at least the following security issues:

A use-after-free vulnerability was found in drivers/nvme/target/tcp.c`
in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP
subsystem in the Linux kernel. This issue may allow a malicious user to
cause a use-after-free and double-free problem, which may permit remote
code execution or lead to local privilege escalation in case that the
attacker already has local privileges. (CVE-2023-5178)

x86: KVM: SVM: always update the x2avic msr interception:
The following problem exists since x2avic was enabled in the KVM:
svm_set_x2apic_msr_interception is called to enable the interception of
the x2apic msrs.
In particular it is called at the moment the guest resets its apic.
Assuming that the guest's apic is in x2apic mode, the reset will bring
it back to the xapic mode.
The svm_set_x2apic_msr_interception however has an erroneous check for
'!apic_x2apic_mode()' which prevents it from doing anything in this case.
As a result of this, all x2apic msrs are left unintercepted, and that
exposes the bare metal x2apic (if enabled) to the guest.
Removing the erroneous '!apic_x2apic_mode()' check fixes that.
(CVE-2023-5090)

In unprivileged Xen guests event handling can cause a deadlock with
Xen console handling. The evtchn_rwlock and the hvc_lock are taken in
opposite sequence in __hvc_poll() and in Xen console IRQ handling.
This is fixed by xen/events: replace evtchn_rwlock with RCU
(CVE-2023-34324)

A use-after-free vulnerability in the Linux kernel's fs/smb/client
component can be exploited to achieve local privilege escalation. In
case of an error in smb3_fs_context_parse_param, ctx->password was freed
but the field was not set to NULL which could lead to double free. We
recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705
(CVE-2023-5345)

A flaw was found in the Netfilter subsystem in the Linux kernel. The
nfnl_osf_add_callback function did not validate the user mode controlled
opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN)
attacker to trigger an out-of-bounds read, leading to a crash or
information disclosure. (CVE-2023-39189)

The reference count changes made as part of the CVE-2023-33951 and
CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory
objects were handled when they were being used to store a surface. When
running inside a VMware guest with 3D acceleration enabled, a local,
unprivileged user could potentially use this flaw to escalate their
privileges. (CVE-2023-5633)

A heap out-of-bounds write vulnerability in the Linux kernel's Linux
Kernel Performance Events (perf) component can be exploited to achieve
local privilege escalation. If perf_read_group() is called while an
event's sibling_list is smaller than its child's sibling_list, it can
increment or write to memory locations ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel-linus' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
4.8

CVSS Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-26555
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
Common Vulnerability Exposure (CVE) ID: CVE-2023-25775
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-34319
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://xenbits.xenproject.org/xsa/advisory-432.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-34324
https://xenbits.xenproject.org/xsa/advisory-441.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-3772
RHBZ#2218943
https://bugzilla.redhat.com/show_bug.cgi?id=2218943
RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:6583
RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:6901
RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2023:7077
RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0412
RHSA-2024:0575
https://access.redhat.com/errata/RHSA-2024:0575
http://www.openwall.com/lists/oss-security/2023/08/10/1
http://www.openwall.com/lists/oss-security/2023/08/10/3
https://access.redhat.com/security/cve/CVE-2023-3772
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://www.debian.org/security/2023/dsa-5492
Common Vulnerability Exposure (CVE) ID: CVE-2023-3773
RHBZ#2218944
https://bugzilla.redhat.com/show_bug.cgi?id=2218944
https://access.redhat.com/security/cve/CVE-2023-3773
Common Vulnerability Exposure (CVE) ID: CVE-2023-39189
RHBZ#2226777
https://bugzilla.redhat.com/show_bug.cgi?id=2226777
RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2394
RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:2950
RHSA-2024:3138
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-39189
Common Vulnerability Exposure (CVE) ID: CVE-2023-4155
RHBZ#2213802
https://bugzilla.redhat.com/show_bug.cgi?id=2213802
https://access.redhat.com/security/cve/CVE-2023-4155
Common Vulnerability Exposure (CVE) ID: CVE-2023-46813
https://bugzilla.suse.com/show_bug.cgi?id=1212649
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf
Common Vulnerability Exposure (CVE) ID: CVE-2023-5090
RHBZ#2248122
https://bugzilla.redhat.com/show_bug.cgi?id=2248122
RHSA-2024:3854
https://access.redhat.com/errata/RHSA-2024:3854
RHSA-2024:3855
https://access.redhat.com/errata/RHSA-2024:3855
https://access.redhat.com/security/cve/CVE-2023-5090
Common Vulnerability Exposure (CVE) ID: CVE-2023-5178
RHBZ#2241924
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
RHSA-2023:7370
https://access.redhat.com/errata/RHSA-2023:7370
RHSA-2023:7379
https://access.redhat.com/errata/RHSA-2023:7379
RHSA-2023:7418
https://access.redhat.com/errata/RHSA-2023:7418
RHSA-2023:7548
https://access.redhat.com/errata/RHSA-2023:7548
RHSA-2023:7549
https://access.redhat.com/errata/RHSA-2023:7549
RHSA-2023:7551
https://access.redhat.com/errata/RHSA-2023:7551
RHSA-2023:7554
https://access.redhat.com/errata/RHSA-2023:7554
RHSA-2023:7557
https://access.redhat.com/errata/RHSA-2023:7557
RHSA-2023:7559
https://access.redhat.com/errata/RHSA-2023:7559
RHSA-2024:0340
https://access.redhat.com/errata/RHSA-2024:0340
RHSA-2024:0378
https://access.redhat.com/errata/RHSA-2024:0378
RHSA-2024:0386
https://access.redhat.com/errata/RHSA-2024:0386
RHSA-2024:0431
https://access.redhat.com/errata/RHSA-2024:0431
RHSA-2024:0432
https://access.redhat.com/errata/RHSA-2024:0432
RHSA-2024:0461
https://access.redhat.com/errata/RHSA-2024:0461
RHSA-2024:0554
https://access.redhat.com/errata/RHSA-2024:0554
RHSA-2024:1268
https://access.redhat.com/errata/RHSA-2024:1268
RHSA-2024:1269
https://access.redhat.com/errata/RHSA-2024:1269
RHSA-2024:1278
https://access.redhat.com/errata/RHSA-2024:1278
https://access.redhat.com/security/cve/CVE-2023-5178
https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/
https://security.netapp.com/advisory/ntap-20231208-0004/
Common Vulnerability Exposure (CVE) ID: CVE-2023-5345
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705
https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705
Common Vulnerability Exposure (CVE) ID: CVE-2023-5633
RHBZ#2245663
https://bugzilla.redhat.com/show_bug.cgi?id=2245663
RHSA-2024:0113
https://access.redhat.com/errata/RHSA-2024:0113
RHSA-2024:0134
https://access.redhat.com/errata/RHSA-2024:0134
RHSA-2024:1404
https://access.redhat.com/errata/RHSA-2024:1404
https://access.redhat.com/security/cve/CVE-2023-5633
Common Vulnerability Exposure (CVE) ID: CVE-2023-5717
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06
https://kernel.dance/32671e3799ca2e4590773fd0e63aaa4229e50c06
Common Vulnerability Exposure (CVE) ID: CVE-2023-6176
RHBZ#2219359
https://bugzilla.redhat.com/show_bug.cgi?id=2219359
https://access.redhat.com/security/cve/CVE-2023-6176
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.