Updated kernel-linus packages fix security vulnerability
Publication date: 21 Jun 2019Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 6
CVE: CVE-2019-5599 , CVE-2019-10142 , CVE-2019-11477 , CVE-2019-11478 , CVE-2019-11479 , CVE-2019-11833
Description
This kernel-linus update is based on the upstream 4.14.127 and fixes at least the following security issues: Jonathan Looney discovered that it is possible to send a crafted sequence of SACKs which will fragment the RACK send map. An attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection (CVE-2019-5599). A flaw was found in the Linux kernel's freescale hypervisor manager implementation. A parameter passed via to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system or corrupt memory or, possibly, create other adverse security affects (CVE-2019-10142). Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service (CVE-2019-11477). Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service (CVE-2019-11478). Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service (CVE-2019-11479). fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem (CVE-2019-11833). It also fixes an upstream regression that caused older 'legacy' bluetooth adapters to stop working (mga #24840). For other uptstream fixes in this update, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=24974
- https://bugs.mageia.org/show_bug.cgi?id=24840
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.120
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.121
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.122
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.123
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.124
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.125
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.126
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5599
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
SRPMS
6/core
- kernel-linus-4.14.127-1.mga6