Lucene search

K
mageiaGentoo FoundationMGASA-2024-0032
HistoryFeb 09, 2024 - 4:34 a.m.

Updated kernel-linus fixes security vulnerabilities and many bugs

2024-02-0904:34:03
Gentoo Foundation
advisories.mageia.org
23
kernel
security fixes
bugfixes
out-of-bounds read
dos
data corruption
privilege escalation
smb2
xen
backend crash
linux kernel

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.4%

Upstream version 6.6.14 with many bugfixes and at least the following security fixes: An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information. (CVE-2023-6610) An unprivileged guest can cause Denial of Service (DoS) of the host by sending network packets to the backend, causing the backend to crash. Data corruption or privilege escalation have not been ruled out. https://xenbits.xen.org/xsa/advisory-448.html (CVE-2023-46838)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchkernel-linus< 6.6.14-1kernel-linus-6.6.14-1.mga9

References

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.4%