SB2019082941 - Fedora 30 update for kernel, kernel-headers, kernel-tools
Published: August 29, 2019 Updated: April 25, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2019-14814)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the mwifiex_update_vs_ie() function in the Marvell Wi-Fi chip driver in Linux kernel. A local user can run a specially crafted application to trigger a heap-based buffer overflow and execute arbitrary code on the system with elevated privileges.
2) Heap-based buffer overflow (CVE-ID: CVE-2019-14815)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the mwifiex_set_uap_rates() function in the Marvell Wi-Fi chip driver in Linux kernel. A local user can run a specially crafted application to trigger a heap-based buffer overflow and execute arbitrary code on the system with elevated privileges.
3) Heap-based buffer overflow (CVE-ID: CVE-2019-14816)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the mwifiex_set_wmm_params() function in the Marvell Wi-Fi chip driver in Linux kernel. A local user can run a specially crafted application to trigger a heap-based buffer overflow and execute arbitrary code on the system with elevated privileges.
4) Double Free (CVE-ID: CVE-2019-15504)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "drivers/net/wireless/rsi/rsi_91x_usb.c". A remote attacker can trigger double free error via crafted USB device traffic (which may be remote via usbip or usbredir) and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Out-of-bounds read (CVE-ID: CVE-2019-15505)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the drivers/media/usb/dvb-usb/technisat-usb2.c USB driver in Linux kernel. A local user can use a specially crafted USB device to trigger out-of-bounds read error during data transfer and read contents of memory on the system.
6) Resource management error (CVE-ID: CVE-2019-15538)
The vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to buggy implementation of quotas in "xfs_setattr_nonsize" in the "fs/xfs/xfs_iops.c" file. A local attacker can send specially crafted requests to the affected system and perform denial of service attack.
Note: This vulnerability can be exploited remotely, if XFS filesystem is exported for instance via NFS.
Remediation
Install update from vendor's website.