#4544: linux-5.3.9
--------------------+-----------------------
Reporter: bdubbs | Owner: lfs-book
Type: task | Status: new
Priority: normal | Milestone: 9.1
Component: Book | Version: SVN
Severity: normal | Resolution:
Keywords: |
--------------------+-----------------------
Comment (by renodr):
This one seems to fix some interesting problems.
With kernel 5.3.8 on my development system, anytime I reboot, the system
locks up after syncing disks. I deduced that if I turned my sound card off
in the BIOS (noticed a warning about snd_hda in the logs), I was able to
get it to continue shutting down. It seems that was a regression fixed in
5.3.9 according to
[https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9]
In addition, it (supposedly, haven't had time to test this yet) fixes a
problem with my AMD system and bringing up a framebuffer console.
Also, this fixes an arbitrary code execution vulnerability in the RTLWIFI
driver for systems which have the driver enabled:
{{{
Arch Linux Security Advisory ASA-201911-9
=========================================
Severity: Critical
Date : 2019-11-07
CVE-ID : CVE-2019-17666
Package : linux-hardened
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1063
Summary
=======
The package linux-hardened before version 5.3.7.b-1 is vulnerable to
arbitrary code execution.
Resolution
==========
Upgrade to 5.3.7.b-1.
# pacman -Syu "linux-hardened>=5.3.7.b-1"
The problem has been fixed upstream in version 5.3.7.b.
Workaround
==========
When Wi-Fi usage is not required, disabling it mitigates the issue.
Description
===========
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the
Linux kernel before 5.3.9, 4.19.82, 4.14.152, 4.9.199, 4.4.199 lacks a
certain upper-bound check, leading to a buffer overflow. An attacker is
able to trigger the overflow remotely through Wi-Fi by using a power-
saving feature known as a Notice of Absence when the Realtek (RTLWIFI)
driver is being used on the affected host leading to arbitrary code
execution.
Impact
======
A remote attacker in Wi-Fi range is able to execute arbitrary code when
the Realtek (RTLWIFI) driver is being used on the affected host.
References
==========
https://lkml.org/lkml/2019/10/16/1226
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1
https://security.archlinux.org/CVE-2019-17666
}}}
--
Ticket URL: <http://wiki.linuxfromscratch.org/lfs/ticket/4544#comment:1>
LFS Trac <http://wiki.linuxfromscratch.org/lfs/>
Linux From Scratch: Your Distro, Your Rules.
--
http://lists.linuxfromscratch.org/listinfo/lfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page