Advisories ยป MGASA-2019-0414

Updated kernel packages fix security vulnerabilities

Publication date: 25 Dec 2019
Modification date: 25 Dec 2019
Type: security
Affected Mageia releases : 7

Description

This update is based on upstream 5.4.6 and fixes various potential
security issues related to buffer overflows, double frees, NUll  pointer
dereferences, improper / missing input validations and so on. It also
adds other bugfixes all over the kernel.

Other fixes added in this update:
- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure(),
  fixing an deadlock issue.
- x86/mm: Split vmalloc_sync_all(), fixing up big performance
  regressions in some x86_64 workloads 
  (example: reaim.jobs_per_min -79.7% regression) 
- The Intel cpu/gpu specific security fixes in upstream 5.3.11 broke
  RC6 and that prevents CPUs from entering C-states, causing higher
  power consumption. This update adds upstream fixes to restore
  RC6 to a working state (fdo#112315)
- radeon changes in upstream 5.4 to remove the 'need_dma32 flag' has
  been reverted as it caused radeon to malfunction on 32bit kernels
- iwlwifi fixes for firmware crashes (mga#25926), failures on warm
  reboot, and performance fixes

WireGuard has been updated to 0.0.20191219.

For other fixes in this update, see the referenced changelogs.
                

References

SRPMS

7/core