| Summary: | Update request: kernel-linus-5.10.12-1.mga7 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | High | CC: | ouaurelien, sysadmin-bugs |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA7-64-OK | ||
| Source RPM: | kernel-linus | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2021-01-30 18:43:07 CET
Thomas Backlund
2021-01-30 18:43:20 CET
Priority:
Normal =>
High
Advisory, added to svn:
type: security
subject: Updated kernel-linus packages fix security vulnerability
CVE:
- CVE-2021-3347
src:
7:
core:
- kernel-linus-5.10.12-1.mga7
description: |
This kernel-linus update is based on upstream 5.10.11 and fixes atleast the
following security issue:
An issue was discovered in the Linux kernel through 5.10.11. PI futexes
have a kernel stack use-after-free during fault handling, allowing local
users to execute code in the kernel (CVE-2021-3347).
For other upstream fixes, see the referenced changelog.
references:
- https://bugs.mageia.org/show_bug.cgi?id=28262
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.12Keywords:
(none) =>
advisory M7 Plasma X86_64, Classic ISO. Runs well. Basic usage OK. nvidia-current is OK through DKMS. All peripherals are OK. Validating, as Kernel-desktop/server with Mageia preset have been already flushed out. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0062.html Status:
NEW =>
RESOLVED |