{"id":"MGASA-2020-0184","summary":"Updated kernel-linus packages fix security vulnerabilities","details":"This provides an update to kernel 5.6 series, currently based on\nupstream 5.6.6 adding support for new hardware and features, and\nfixes at least the following security issues:\n\nIn the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image,\nperforming some operations, and unmounting can lead to a use-after-free\nin btrfs_queue_work in fs/btrfs/async-thread.c (CVE-2019-19377).\n\nAn issue was discovered in slc_bump in drivers/net/can/slcan.c in the\nLinux kernel through 5.6.2. It allows attackers to read uninitialized\ncan_frame data, potentially containing sensitive information from kernel\nstack memory, if the configuration lacks CONFIG_INIT_STACK_ALL\n(CVE-2020-11494).\n\nAn issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str\nin mm/mempolicy.c has a stack-based out-of-bounds write because an empty\nnodelist is mishandled during mount option parsing (CVE-2020-11565).\n\nAn issue was discovered in the Linux kernel before 5.6.1. drivers/media/\nusb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs\nand ov518_mode_init_regs when there are zero endpoints (CVE-2020-11608).\n\nAn issue was discovered in the stv06xx subsystem in the Linux kernel\nbefore 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/\nusb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as\ndemonstrated by a NULL pointer dereference (CVE-2020-11609).\n\nIn the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c\n(aka the Xirlink camera USB driver) mishandles invalid descriptors\n(CVE-2020-11668).\n\nFor other fixes and changes in this update, see the refenced changelogs.\n","modified":"2026-02-01T08:51:11.028539Z","published":"2020-04-25T20:55:48Z","related":["CVE-2019-19377","CVE-2020-11494","CVE-2020-11565","CVE-2020-11608","CVE-2020-11609","CVE-2020-11668"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0184.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26526"},{"type":"REPORT","url":"https://kernelnewbies.org/Linux_5.6"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.2"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.3"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.4"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.6"}],"affected":[{"package":{"name":"kernel-linus","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/kernel-linus?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.6.6-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0184.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}