SB2019072240 - Slackware Linux update for kernel
Published: July 22, 2019 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Race condition (CVE-ID: CVE-2019-11599)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition with mmget_not_zero or get_task_mm calls and is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c due to kernel does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-13272)
3) Authorization bypass (CVE-ID: CVE-2018-16597)
The vulnerability allows a local authenticated user to manipulate data.
An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.
4) Heap-based buffer overflow (CVE-ID: CVE-2019-10126)
The vulnerability allows a local user to perform a denial of service (DoS) condition or execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Marvell Wireless LAN device driver in "mwifiex_uap_parse_tail_ies" function in "drivers/net/wireless/marvell/mwifiex/ie.c". A local authenticated user can trigger heap-based buffer overflow and cause a denial of service (system crash) or possibly execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Buffer overflow (CVE-ID: CVE-2019-3846)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
Remediation
Install update from vendor's website.