Updated kernel packages fix security vulnerability
Publication date: 13 Mar 2019Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-1000026
Description
This kernel update is based on the upstream 4.14.104 and fixes at least
the following security issue:
Linux Linux kernel version at least v4.8 onwards, probably well before
contains a Insufficient input validation vulnerability in bnx2x network
card driver that can result in DoS: Network card firmware assertion takes
card off-line. This attack appear to be exploitable via An attacker on a
must pass a very large, specially crafted packet to the bnx2x card.
This can be done from an untrusted guest VM (CVE-2018-1000026).
It also fixes signal handling issues causing powertop to crash and some
tracing tools to fail on execve tests.
For other uptstream fixes in this update, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=24440
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.101
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.102
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.103
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
SRPMS
6/core
- kernel-4.14.104-2.mga6
- kernel-userspace-headers-4.14.104-2.mga6
- kmod-vboxadditions-5.2.24-8.mga6
- kmod-virtualbox-5.2.24-8.mga6
- kmod-xtables-addons-2.13-82.mga6