The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2023-0243 advisory. This kernel-linus update is based on upstream 5.15.122 and fixes certain security issues
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Updated kernel-linus packages fix security vulnerabilities | 27 Jul 202301:07 | – | mageia |
![]() | Updated kernel packages fix security vulnerabilities | 19 Jul 202322:53 | – | mageia |
![]() | Updated microcode packages fix security vulnerability | 27 Jul 202301:07 | – | mageia |
![]() | Updated kernel packages fix security vulnerability | 27 Jul 202301:07 | – | mageia |
![]() | Fedora: Security Advisory for kernel-tools (FEDORA-2023-e4e985b5dd) | 26 Jul 202300:00 | – | openvas |
![]() | Fedora: Security Advisory for kernel (FEDORA-2023-e4e985b5dd) | 26 Jul 202300:00 | – | openvas |
![]() | Fedora: Security Advisory for kernel-headers (FEDORA-2023-e4e985b5dd) | 26 Jul 202300:00 | – | openvas |
![]() | Fedora: Security Advisory for kernel (FEDORA-2023-3661f028b8) | 26 Jul 202300:00 | – | openvas |
![]() | Fedora: Security Advisory for kernel-headers (FEDORA-2023-3661f028b8) | 26 Jul 202300:00 | – | openvas |
![]() | Fedora: Security Advisory for kernel-tools (FEDORA-2023-3661f028b8) | 26 Jul 202300:00 | – | openvas |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.10.2023.0243");
script_cve_id("CVE-2023-20593", "CVE-2023-31248", "CVE-2023-35001");
script_tag(name:"creation_date", value:"2023-07-27 04:12:36 +0000 (Thu, 27 Jul 2023)");
script_version("2024-02-02T05:06:10+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:10 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-07-12 16:49:52 +0000 (Wed, 12 Jul 2023)");
script_name("Mageia: Security Advisory (MGASA-2023-0243)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Mageia Linux Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mageia_linux", "ssh/login/release", re:"ssh/login/release=MAGEIA8");
script_xref(name:"Advisory-ID", value:"MGASA-2023-0243");
script_xref(name:"URL", value:"https://advisories.mageia.org/MGASA-2023-0243.html");
script_xref(name:"URL", value:"https://bugs.mageia.org/show_bug.cgi?id=32140");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.121");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.122");
script_xref(name:"URL", value:"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html");
script_tag(name:"summary", value:"The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2023-0243 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"This kernel-linus update is based on upstream 5.15.122 and fixes at least
the following security issues:
Under specific microarchitectural circumstances, a register in 'Zen 2'
CPUs may not be written to 0 correctly. This may cause data from another
process and/or thread to be stored in the YMM register, which may allow
an attacker to potentially access sensitive information (CVE-2023-20593,
also known as Zenbleed).
This update adds a kernel-side mitigation for this issue to protect users
until Amd gets their fixed microcode / AGESA updates out for all affected
CPUs. The fixed microcode for Amd EPYC gen2 is available in the
microcode-0.20230613-2.mga8.nonfree package. For other affected CPUs, see
the referenced amd.com url that has info about estimated microcode update
timelines for various CPUs.
Linux Kernel nftables Use-After-Free Local Privilege Escalation
Vulnerability, nft_chain_lookup_byid() failed to check whether a chain
was active and CAP_NET_ADMIN is in any user or network namespace
(CVE-2023-31248).
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability,
nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN
is in any user or network namespace (CVE-2023-35001).
For other upstream fixes in this update, see the referenced changelogs.");
script_tag(name:"affected", value:"'kernel-linus' package(s) on Mageia 8.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "MAGEIA8") {
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-5.15.122-1.mga8", rpm:"kernel-linus-5.15.122-1.mga8~1~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus", rpm:"kernel-linus~5.15.122~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-devel-5.15.122-1.mga8", rpm:"kernel-linus-devel-5.15.122-1.mga8~1~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-devel-latest", rpm:"kernel-linus-devel-latest~5.15.122~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-doc", rpm:"kernel-linus-doc~5.15.122~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-latest", rpm:"kernel-linus-latest~5.15.122~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-source-5.15.122-1.mga8", rpm:"kernel-linus-source-5.15.122-1.mga8~1~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-source-latest", rpm:"kernel-linus-source-latest~5.15.122~1.mga8", rls:"MAGEIA8"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo