Mageia 2020-0041: kernel security update
Summary
This update is based on upstream 5.4.12 and fixes atleast the following
security vulnerabilities:
Intel GPU Hardware prior to Gen11 does not clear EU state during a
context switch. This can result in information leakage between
contexts (CVE-2019-14615).
A heap-based buffer overflow was discovered in the Marvell WiFi chip
driver. The flaw could occur when the station attempts a connection
negotiation during the handling of the remote devices country settings.
This could allow the remote device to cause a denial of service (system
crash) or possibly execute arbitrary code (CVE-2019-14895).
For other fixes in this update, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=26078
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.11
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
Resolution
MGASA-2020-0041 - Updated kernel packages fix security vulnerabilities
SRPMS
- 7/core/kernel-5.4.12-1.mga7
- 7/core/kmod-virtualbox-6.0.14-20.mga7
- 7/core/kmod-xtables-addons-3.7-10.mga7