| Summary: | Update request: kernel-linus-5.10.78-1.mga8 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs, tarazed25 |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | kernel-linus | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2021-11-07 11:37:57 CET
Advisory, added to svn:
type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
- CVE-2021-3760
- CVE-2021-3772
- CVE-2021-42327
- CVE-2021-43267
- CVE-2021-43389
src:
8:
core:
- kernel-linus-5.10.78-1.mga8
description: |
This kernel-linus update is based on upstream 5.10.78 and fixes atleast
the following security issues:
A use-after-free vulnerability in the NFC stack can lead to a threat to
confidentiality, integrity, and system availability (CVE-2021-3760).
A flaw in the SCTP stack where a blind attacker may be able to kill an
existing SCTP association through invalid chunks if the attacker knows
the IP-addresses and port numbers being used and the attacker can send
packets with spoofed IP addresses (CVE-2021-3772).
A flaw heap buffer overflow in the Linux kernel's AMD Radeon graphics
card driver was found in the way user writes some malicious data to the
AMD GPU Display Driver Debug Filesystem (to the VGA sub-directory of the
/sys/kernel/debug/ directory). A local user could use this flaw to crash
the system or escalate their privileges on the system (CVE-2021-42327).
A flaw was discovered in the cryptographic receive code in the Linux
kernel's implementation of transparent interprocess communication. An
attacker, with the ability to send TIPC messages to the target, can
corrupt memory and escalate privileges on the target system
(CVE-2021-43267).
An issue was discovered in the Linux kernel before 5.14.15. There is an
array-index-out-of-bounds flaw in the detach_capi_ctr function in
drivers/isdn/capi/kcapi.c (CVE-2021-43389).
For other upstream fixes, see the referenced changelogs.
references:
- https://bugs.mageia.org/show_bug.cgi?id=29629
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.76
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.77
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.78Keywords:
(none) =>
advisory Updated smoothly from kernel-linus-5.10.70. nvidia graphics driver rebuilt before the reboot. Kernel: 5.10.78-1.mga8 x86_64 Quad Core Intel Core i7-479 NVIDIA GM204 [GeForce GTX 970] driver: nvidia v: 470.74 Mate desktop running, NFS shares auto-mounted. Bluetooth with btusb worked after a lot of floundering around between blueman and bluetoothctl. Sometimes bluetooth is your friend, other times it starts off in a very bad mood. Everything else seems to be working as normal. 81 package scheduled update including kernel-desktop-5.10.75. CC:
(none) =>
tarazed25
Thomas Backlund
2021-11-11 15:21:24 CET
Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0508.html Status:
NEW =>
RESOLVED |