Mageia 2018-0391: kernel security update
Summary
This kernel update is based on the upstream 4.14.70 and adds additional
fixes for the L1TF security issues. It also fixes atleast the following
security issues:
Linux kernel from versions 3.9 and up, is vulnerable to a denial of
service attack with low rates of specially modified packets targeting IP
fragment re-assembly. An attacker may cause a denial of service condition
by sending specially crafted IP fragments (CVE-2018-5391, FragmentSmack).
A security flaw was found in the ip_frag_reasm() function in
net/ipv4/ip_fragment.c in the Linux kernel caused by fixes for
CVE-2018-5391, which can cause a later system crash in ip_do_fragment().
With certain non-default, but non-rare, configuration of a victim host,
an attacker can trigger this crash remotely, thus leading to a remote
denial-of-service (CVE-2018-14641).
An issue was discovered in the Linux kernel through 4.18.8. The
vmacache_flush_all function in mm/vmacache.c mishandles sequence number
overflows. An attacker can trigger a...
References
- https://bugs.mageia.org/show_bug.cgi?id=23586
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.70
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14641
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182
Resolution
MGASA-2018-0391 - Updated kernel packages fix security vulnerabilities
SRPMS
- 6/core/kernel-4.14.70-2.mga6
- 6/core/kernel-userspace-headers-4.14.70-2.mga6
- 6/core/kmod-vboxadditions-5.2.18-6.mga6
- 6/core/kmod-virtualbox-5.2.18-6.mga6
- 6/core/kmod-xtables-addons-2.13-66.mga6