Lucene search

K
mageiaGentoo FoundationMGASA-2019-0332
HistoryNov 20, 2019 - 12:16 a.m.

Updated kernel packages fix security vulnerabilities

2019-11-2000:16:53
Gentoo Foundation
advisories.mageia.org
33

0.001 Low

EPSS

Percentile

23.0%

This kernel update is based on the upstream 5.3.11 and fixes at least the following security issues: Insufficient access control in a subsystem for Intel ยฎ processor graphics may allow an authenticated user to potentially enable escalation of privilege via local access (CVE-2019-0155). TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access (CVE-2019-11135). Improper invalidation for page table updates by a virtual guest operating system for multiple Intelยฎ Processors may allow an authenticated user to potentially enable denial of service of the host system via local access (CVE-2018-12207). For proper mitigations and fixes for theese issues, a microcode update is also needed, either with a bios/uefi update from your hardware vendor or by installing the microcode-0.20191112-1.mga7.nonfree update (mga#25688). For other upstream fixes in this update, see the referenced changelogs.