Mageia 2020-0073: kernel security update
Summary
This update is based on upstream 5.4.17 and fixes atleast the following
security vulnerabilities:
In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel
may be able to read memory locations from another process in the same guest.
This problem is limit to the host running linux kernel 4.10 with a guest
running linux kernel 4.16 or later. The problem mainly affects AMD
processors but Intel CPUs cannot be ruled out (CVE-2019-3016).
A heap-based buffer overflow vulnerability was found in the Linux kernel,
in Marvell WiFi chip driver. A remote attacker could cause a denial of
service (system crash) or, possibly execute arbitrary code, when the
lbs_ibss_join_existing function is called after a STA connects to an AP
(CVE-2019-14896).
A stack-based buffer overflow was found in the Linux kernel, in Marvell
WiFi chip driver. An attacker is able to cause a denial of service
(system crash) or, possibly execute arbitrary code, when a STA works in
IBSS mode (allows connecting...
References
- https://bugs.mageia.org/show_bug.cgi?id=26152
- https://bugs.mageia.org/show_bug.cgi?id=16268
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.13
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.15
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14896
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
Resolution
MGASA-2020-0073 - Updated kernel packages fix security vulnerabilities
SRPMS
- 7/core/kernel-5.4.17-1.mga7
- 7/core/kmod-virtualbox-6.0.16-3.mga7
- 7/core/kmod-xtables-addons-3.7-13.mga7
- 7/core/wireguard-tools-1.0.20200121-1.mga7