Opened 4 years ago

Closed 4 years ago

#4544 closed task (fixed)

linux-5.3.9

Reported by: Bruce Dubbs Owned by: lfs-book
Priority: normal Milestone: 9.1
Component: Book Version: SVN
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (2)

comment:1 by Douglas R. Reno, 4 years ago

This one seems to fix some interesting problems.

With kernel 5.3.8 on my development system, anytime I reboot, the system locks up after syncing disks. I deduced that if I turned my sound card off in the BIOS (noticed a warning about snd_hda in the logs), I was able to get it to continue shutting down. It seems that was a regression fixed in 5.3.9 according to https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9

In addition, it (supposedly, haven't had time to test this yet) fixes a problem with my AMD system and bringing up a framebuffer console.

Also, this fixes an arbitrary code execution vulnerability in the RTLWIFI driver for systems which have the driver enabled:


Arch Linux Security Advisory ASA-201911-9
=========================================

Severity: Critical
Date    : 2019-11-07
CVE-ID  : CVE-2019-17666
Package : linux-hardened
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1063

Summary
=======

The package linux-hardened before version 5.3.7.b-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 5.3.7.b-1.

# pacman -Syu "linux-hardened>=5.3.7.b-1"

The problem has been fixed upstream in version 5.3.7.b.

Workaround
==========

When Wi-Fi usage is not required, disabling it mitigates the issue.

Description
===========

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the
Linux kernel before 5.3.9, 4.19.82, 4.14.152, 4.9.199, 4.4.199 lacks a
certain upper-bound check, leading to a buffer overflow. An attacker is
able to trigger the overflow remotely through Wi-Fi by using a power-
saving feature known as a Notice of Absence when the Realtek (RTLWIFI)
driver is being used on the affected host leading to arbitrary code
execution.

Impact
======

A remote attacker in Wi-Fi range is able to execute arbitrary code when
the Realtek (RTLWIFI) driver is being used on the affected host.

References
==========

https://lkml.org/lkml/2019/10/16/1226
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1
https://security.archlinux.org/CVE-2019-17666

comment:2 by Douglas R. Reno, 4 years ago

Resolution: fixed
Status: newclosed

Fixed at r11698

Note: See TracTickets for help on using tickets.