#4544: linux-5.3.9
--------------------+-----------------------
 Reporter:  bdubbs  |       Owner:  lfs-book
     Type:  task    |      Status:  new
 Priority:  normal  |   Milestone:  9.1
Component:  Book    |     Version:  SVN
 Severity:  normal  |  Resolution:
 Keywords:          |
--------------------+-----------------------

Comment (by renodr):

 This one seems to fix some interesting problems.

 With kernel 5.3.8 on my development system, anytime I reboot, the system
 locks up after syncing disks. I deduced that if I turned my sound card off
 in the BIOS (noticed a warning about snd_hda in the logs), I was able to
 get it to continue shutting down. It seems that was a regression fixed in
 5.3.9 according to
 [https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9]

 In addition, it (supposedly, haven't had time to test this yet) fixes a
 problem with my AMD system and bringing up a framebuffer console.

 Also, this fixes an arbitrary code execution vulnerability in the RTLWIFI
 driver for systems which have the driver enabled:

 {{{


 Arch Linux Security Advisory ASA-201911-9
 =========================================

 Severity: Critical
 Date    : 2019-11-07
 CVE-ID  : CVE-2019-17666
 Package : linux-hardened
 Type    : arbitrary code execution
 Remote  : Yes
 Link    : https://security.archlinux.org/AVG-1063

 Summary
 =======

 The package linux-hardened before version 5.3.7.b-1 is vulnerable to
 arbitrary code execution.

 Resolution
 ==========

 Upgrade to 5.3.7.b-1.

 # pacman -Syu "linux-hardened>=5.3.7.b-1"

 The problem has been fixed upstream in version 5.3.7.b.

 Workaround
 ==========

 When Wi-Fi usage is not required, disabling it mitigates the issue.

 Description
 ===========

 rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the
 Linux kernel before 5.3.9, 4.19.82, 4.14.152, 4.9.199, 4.4.199 lacks a
 certain upper-bound check, leading to a buffer overflow. An attacker is
 able to trigger the overflow remotely through Wi-Fi by using a power-
 saving feature known as a Notice of Absence when the Realtek (RTLWIFI)
 driver is being used on the affected host leading to arbitrary code
 execution.

 Impact
 ======

 A remote attacker in Wi-Fi range is able to execute arbitrary code when
 the Realtek (RTLWIFI) driver is being used on the affected host.

 References
 ==========

 https://lkml.org/lkml/2019/10/16/1226
 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1
 https://security.archlinux.org/CVE-2019-17666
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/lfs/ticket/4544#comment:1>
LFS Trac <http://wiki.linuxfromscratch.org/lfs/>
Linux From Scratch: Your Distro, Your Rules.
-- 
http://lists.linuxfromscratch.org/listinfo/lfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to