MGASA-2020-0041

Source
https://advisories.mageia.org/MGASA-2020-0041.html
Import Source
https://advisories.mageia.org/MGASA-2020-0041.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0041
Related
Published
2020-01-17T10:16:50Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel packages fix security vulnerabilities
Details

This update is based on upstream 5.4.12 and fixes at least the following security vulnerabilities:

Intel GPU Hardware prior to Gen11 does not clear EU state during a context switch. This can result in information leakage between contexts (CVE-2019-14615).

A heap-based buffer overflow was discovered in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2019-14895).

For other fixes in this update, see the referenced changelogs.

References
Credits

Affected packages

Mageia:7 / kernel

Package

Name
kernel
Purl
pkg:rpm/mageia/kernel?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.12-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / kmod-virtualbox

Package

Name
kmod-virtualbox
Purl
pkg:rpm/mageia/kmod-virtualbox?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.14-20.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / kmod-xtables-addons

Package

Name
kmod-xtables-addons
Purl
pkg:rpm/mageia/kmod-xtables-addons?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7-10.mga7

Ecosystem specific

{
    "section": "core"
}