MGASA-2020-0041 - Updated kernel packages fix security vulnerabilities

Publication date: 17 Jan 2020
URL: https://advisories.mageia.org/MGASA-2020-0041.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-14615,
     CVE-2019-14895

This update is based on upstream 5.4.12 and fixes atleast the following
security vulnerabilities:

Intel GPU Hardware prior to Gen11 does not clear EU state during a
context switch. This can result in information leakage between
contexts (CVE-2019-14615).

A heap-based buffer overflow was discovered in the Marvell WiFi chip
driver. The flaw could occur when the station attempts a connection
negotiation during the handling of the remote devices country settings.
This could allow the remote device to cause a denial of service (system
crash) or possibly execute arbitrary code (CVE-2019-14895).

For other fixes in this update, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=26078
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.11
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895

SRPMS:
- 7/core/kernel-5.4.12-1.mga7
- 7/core/kmod-virtualbox-6.0.14-20.mga7
- 7/core/kmod-xtables-addons-3.7-10.mga7

Mageia 2020-0041: kernel security update

This update is based on upstream 5.4.12 and fixes atleast the following security vulnerabilities: Intel GPU Hardware prior to Gen11 does not clear EU state during a context switch

Summary

This update is based on upstream 5.4.12 and fixes atleast the following security vulnerabilities:
Intel GPU Hardware prior to Gen11 does not clear EU state during a context switch. This can result in information leakage between contexts (CVE-2019-14615).
A heap-based buffer overflow was discovered in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2019-14895).
For other fixes in this update, see the referenced changelogs.

References

- https://bugs.mageia.org/show_bug.cgi?id=26078

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.11

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895

Resolution

MGASA-2020-0041 - Updated kernel packages fix security vulnerabilities

SRPMS

- 7/core/kernel-5.4.12-1.mga7

- 7/core/kmod-virtualbox-6.0.14-20.mga7

- 7/core/kmod-xtables-addons-3.7-10.mga7

Severity
Publication date: 17 Jan 2020
URL: https://advisories.mageia.org/MGASA-2020-0041.html
Type: security
CVE: CVE-2019-14615, CVE-2019-14895

Related News