Updated kernel packages fix security vulnerability
Publication date: 21 Jun 2019Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 6
CVE: CVE-2019-5599 , CVE-2019-11477 , CVE-2019-11478 , CVE-2019-11479
Description
This kernel update is based on the upstream 4.14.127 and fixes at least the following security issues: Jonathan Looney discovered that it is possible to send a crafted sequence of SACKs which will fragment the RACK send map. An attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection (CVE-2019-5599). Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service (CVE-2019-11477). Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service (CVE-2019-11478). Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service (CVE-2019-11479). WireGuard has been updated to 0.0.20190601. For other uptstream fixes in this update, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=24972
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.122
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.123
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.124
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.125
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.126
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5599
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
SRPMS
6/core
- kernel-4.14.127-1.mga6
- kernel-userspace-headers-4.14.127-1.mga6
- kmod-vboxadditions-6.0.8-4.mga6
- kmod-virtualbox-6.0.8-4.mga6
- kmod-xtables-addons-2.13-88.mga6
- wireguard-tools-0.0.20190601-1.mga6