kernel-3.10.0-1062.12.1.el7

エラータID: AXSA:2020-4568:02

Release date: 
Thursday, April 2, 2020 - 09:46
Subject: 
kernel-3.10.0-1062.12.1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)

* kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895)

* kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)

* kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c (CVE-2019-17133)

* kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 (CVE-2019-14898)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [Azure][7.8] Include patch "PCI: hv: Avoid use of hv_pci_dev->pci_slot after freeing it"

* [Hyper-V] When accelerated networking is enabled on network interface(eth0) moved to new network namespace does not obtain IP address.

* [Azure] hv_vmbus probe pass-through GPU card failed

* SMB3: Do not error out on large file transfers if server responds with STATUS_INSUFFICIENT_RESOURCES

* High load can cause dm-multipath path failures

* Hard lockup in free_one_page()->_raw_spin_lock() because sosreport command is reading from /proc/pagetypeinfo

* patchset for x86/atomic: Fix smp_mb__{before,after}_atomic()

* fix compat statfs64() returning EOVERFLOW for when _FILE_OFFSET_BITS=64

* Guest crash after load cpuidle-haltpoll driver

* long I/O stalls with bnx2fc from not masking off scope bits of retry delay value

* Multiple "mv" processes hung on a gfs2 filesystem

* Moving Egress IP will result in conntrack sessions being DESTROYED

* core: backports from upstream

* kernel BUG at arch/powerpc/platforms/pseries/lpar.c:482!

* Race between tty_open() and flush_to_ldisc() using the tty_struct->driver_data field.

CVE-2019-11599
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
CVE-2019-14816
There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
CVE-2019-14895
A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
CVE-2019-14898
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2019-14901
A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
CVE-2019-17133
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-1062.12.1.el7.src.rpm
    MD5: fa5a14a92a107856b084f4231125a590
    SHA-256: b76589894960916c5a99f99117b25d2a136c07936769d670048091f0bf6bc8b6
    Size: 98.70 MB

Asianux Server 7 for x86_64
  1. bpftool-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: 785a284a5544fc5bebe85f205988fb55
    SHA-256: 3bb2a552ec64786f4ffc459e25691c9b7d7d240298efecc728ca5937fe88501c
    Size: 8.19 MB
  2. kernel-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: 8a83c621e2336ef1858feec5509ec9e9
    SHA-256: 6f8e6b51d55ead8cb63929dad9b11d5b044cc5ea73f48a569728aaf9c1f3873d
    Size: 49.78 MB
  3. kernel-abi-whitelists-3.10.0-1062.12.1.el7.noarch.rpm
    MD5: 7619458fb1b712dfa68b05fb4ead5352
    SHA-256: 956141a36fa736c798f50a66e367c920a1c6ac0257c4f80c57a70ec6d24214f5
    Size: 7.76 MB
  4. kernel-debug-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: cb116e1e9e62b8d3df3bad91893d2904
    SHA-256: 207be166c3e1c31ed38b111400c30d27bde594d0f479c182e108a426845f3a7b
    Size: 52.05 MB
  5. kernel-debug-devel-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: d09607355c4b48f92117c4d59e58dd2e
    SHA-256: bec17f1ac814ffbbf1a91e328f3fd12d4022cf88cd0d6b59acd9cfac475d587f
    Size: 17.69 MB
  6. kernel-devel-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: 49837211a5bca59254150c9ad444a934
    SHA-256: 1c6ec8b62bb1cf8c4b7550ea383e5add40a50ca456d5c85d6cbfad2f23f38cc3
    Size: 17.62 MB
  7. kernel-doc-3.10.0-1062.12.1.el7.noarch.rpm
    MD5: 2e955e715d52959e9ba8566642bf3858
    SHA-256: 1d7db3ff3481ef6ce2b08a59a8c2ff5fbfeb8f62d152fb9c9b3c52275755127c
    Size: 19.19 MB
  8. kernel-headers-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: 824faf979e175b0375b2e8111c3e37e0
    SHA-256: e13836c7fb9fc26d73e04bf17216cb7db329f6782145c0dd4dddf55cbecb1c5a
    Size: 8.74 MB
  9. kernel-tools-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: f9888b9cccb1be57705d5adf5dcaabc4
    SHA-256: aacbe863f2c9a5c012087c8153f4cbd82a2b53a59256135c6adcb7a6556797fe
    Size: 7.85 MB
  10. kernel-tools-libs-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: d85071179d10c1307dc739455c3d020d
    SHA-256: 9d25d237542ff5c25d7a55f090171b38cd69a7f3b616e082e23a5d6d2e0406b4
    Size: 7.76 MB
  11. perf-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: b28a72b4c64a808e056237cb6f1ea02e
    SHA-256: 865462271b25e583baae2dd07dbc79c5e5e0696d1fe4d538fbc81944cf6d79a8
    Size: 9.39 MB
  12. python-perf-3.10.0-1062.12.1.el7.x86_64.rpm
    MD5: 217150db1eb52050861d5e89c67e3d08
    SHA-256: 2da4a154bec87133d6d661e60c059a59a43e7bbf55111fd4d76bf77a6786c911
    Size: 7.85 MB