Bug 28164 - Update request: kernel-linus-5.10.11-1.mga7
Summary: Update request: kernel-linus-5.10.11-1.mga7
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-01-18 22:12 CET by Thomas Backlund
Modified: 2021-01-29 20:06 CET (History)
2 users (show)

See Also:
Source RPM: kernel-linus
CVE:
Status comment:


Attachments

Description Thomas Backlund 2021-01-18 22:12:58 CET
SRPM:
kernel-linus-5.10.8-2.mga7.src.rpm


i586:
kernel-linus-5.10.8-2.mga7-1-1.mga7.i586.rpm
kernel-linus-devel-5.10.8-2.mga7-1-1.mga7.i586.rpm
kernel-linus-devel-latest-5.10.8-2.mga7.i586.rpm
kernel-linus-doc-5.10.8-2.mga7.noarch.rpm
kernel-linus-latest-5.10.8-2.mga7.i586.rpm
kernel-linus-source-5.10.8-2.mga7-1-1.mga7.noarch.rpm
kernel-linus-source-latest-5.10.8-2.mga7.noarch.rpm


x86_64:
kernel-linus-5.10.8-2.mga7-1-1.mga7.x86_64.rpm
kernel-linus-devel-5.10.8-2.mga7-1-1.mga7.x86_64.rpm
kernel-linus-devel-latest-5.10.8-2.mga7.x86_64.rpm
kernel-linus-doc-5.10.8-2.mga7.noarch.rpm
kernel-linus-latest-5.10.8-2.mga7.x86_64.rpm
kernel-linus-source-5.10.8-2.mga7-1-1.mga7.noarch.rpm
kernel-linus-source-latest-5.10.8-2.mga7.noarch.rpm
Comment 1 Thomas Backlund 2021-01-18 22:16:05 CET
Advisory:
This kernel-linus update is based on upstream 5.10.8 and fixes atleast the
following security issue:

SCSI “EXTENDED COPY” (XCOPY) requests sent to a Linux SCSI target (LIO)
allow an attacker to read or write anywhere on any LIO backstore configured
on the host, provided the attacker has access to one LUN and knowledge of
the victim backstore’s vpd_unit_serial (AKA “wwn”). This is possible
regardless of the transport/HBA settings for the victim backstore
(CVE-2020-28374).

It also adds the following fix:
- fix up kernel-devel packages to not cause errors during dkms installs
  (mga#27080)

references:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.8
Comment 2 Len Lawrence 2021-01-19 10:40:56 CET
Kernel: 5.10.8-2.mga7 x86_64
Mobo: MSI model: Z97-G43 (MS-7816)
Quad Core: Intel Core i7-4790 type: MT MCP
NVIDIA GM204 [GeForce GTX 970] driver: nouveau

No problems.  Rebooted, building nvidia driver and virtualbox driver on the way.
virtualbox driver installed.
fileserver and NAS storage online at login.
Ran the stress tests.  Launched virtualbox and booted one of three clients.
Everything looks OK at a quick glance.  Leaving it to run for a couple of days.

CC: (none) => tarazed25

Comment 3 Thomas Backlund 2021-01-24 14:59:11 CET
so there were some upstream issues in 5.10.8 that is fixed in 5.10.10, so lets update to that before releasing this...
 

SRPMS:
kernel-linus-5.10.10-1.mga7.src.rpm

i586:
kernel-linus-5.10.10-1.mga7-1-1.mga7.i586.rpm
kernel-linus-devel-5.10.10-1.mga7-1-1.mga7.i586.rpm
kernel-linus-devel-latest-5.10.10-1.mga7.i586.rpm
kernel-linus-doc-5.10.10-1.mga7.noarch.rpm
kernel-linus-latest-5.10.10-1.mga7.i586.rpm
kernel-linus-source-5.10.10-1.mga7-1-1.mga7.noarch.rpm
kernel-linus-source-latest-5.10.10-1.mga7.noarch.rpm


x86_64:
kernel-linus-5.10.10-1.mga7-1-1.mga7.x86_64.rpm
kernel-linus-devel-5.10.10-1.mga7-1-1.mga7.x86_64.rpm
kernel-linus-devel-latest-5.10.10-1.mga7.x86_64.rpm
kernel-linus-doc-5.10.10-1.mga7.noarch.rpm
kernel-linus-latest-5.10.10-1.mga7.x86_64.rpm
kernel-linus-source-5.10.10-1.mga7-1-1.mga7.noarch.rpm
kernel-linus-source-latest-5.10.10-1.mga7.noarch.rpm

Summary: Update request: kernel-linus-5.10.8-2.mga7 => Update request: kernel-linus-5.10.10-1.mga7

Comment 4 Thomas Backlund 2021-01-24 15:00:08 CET

Updated advisory:

This kernel-linus update is based on upstream 5.10.10 and fixes atleast the
following security issue:

SCSI “EXTENDED COPY” (XCOPY) requests sent to a Linux SCSI target (LIO)
allow an attacker to read or write anywhere on any LIO backstore configured
on the host, provided the attacker has access to one LUN and knowledge of
the victim backstore’s vpd_unit_serial (AKA “wwn”). This is possible
regardless of the transport/HBA settings for the victim backstore
(CVE-2020-28374).

It also adds the following fix:
- fix up kernel-devel packages to not cause errors during dkms installs
  (mga#27080)

references:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.8
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.9
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.10
Comment 5 Len Lawrence 2021-01-25 18:43:50 CET
Updated the earlier linus kernel.

Kernel: 5.10.10-1.mga7 x86_64
Mobo: MSI model: Z97-G43 (MS-7816) v: 3.0
Quad Core: Intel Core i7-4790 type: MT MCP
NVIDIA GM204 [GeForce GTX 970] driver: nouveau

Mate desktop survived intact.  NFS shares mounted.
glmark2 runs with Mesa 20.2.6
stress tests c/m/i/d running concurrently.
Scheduled updates OK.
Thunderbird and LO work as usual.  Other desktop applications run fine.
Comment 6 Thomas Backlund 2021-01-28 13:05:41 CET
and one more update, as upstream 5.10.11 has picked up the splicing fix and the fixes for non-booting 32 bit systems and some crash fixes...

and atleast one other security fix


SRPM:
kernel-linus-5.10.11-1.mga7.src.rpm


i586:
kernel-linus-5.10.11-1.mga7-1-1.mga7.i586.rpm
kernel-linus-devel-5.10.11-1.mga7-1-1.mga7.i586.rpm
kernel-linus-devel-latest-5.10.11-1.mga7.i586.rpm
kernel-linus-doc-5.10.11-1.mga7.noarch.rpm
kernel-linus-latest-5.10.11-1.mga7.i586.rpm
kernel-linus-source-5.10.11-1.mga7-1-1.mga7.noarch.rpm
kernel-linus-source-latest-5.10.11-1.mga7.noarch.rpm


x86_64:
kernel-linus-5.10.11-1.mga7-1-1.mga7.x86_64.rpm
kernel-linus-devel-5.10.11-1.mga7-1-1.mga7.x86_64.rpm
kernel-linus-devel-latest-5.10.11-1.mga7.x86_64.rpm
kernel-linus-doc-5.10.11-1.mga7.noarch.rpm
kernel-linus-latest-5.10.11-1.mga7.x86_64.rpm
kernel-linus-source-5.10.11-1.mga7-1-1.mga7.noarch.rpm
kernel-linus-source-latest-5.10.11-1.mga7.noarch.rpm

Summary: Update request: kernel-linus-5.10.10-1.mga7 => Update request: kernel-linus-5.10.11-1.mga7

Comment 7 Len Lawrence 2021-01-28 17:17:54 CET
Kernel: 5.10.11-1.mga7 x86_64
Quad Core: Intel Core i7-4790 type: MT MCP
NVIDIA GM204 [GeForce GTX 970] driver: nouveau

Updated from the previous linus kernel.
No changes in the desktop.
Leaving this to run for a while.
Comment 8 Len Lawrence 2021-01-28 20:48:07 CET
Kernel: 5.10.11-1.mga7 x86_64
10-Core: Intel Core i9-7900X
NVIDIA GP102 [GeForce GTX 1080 Ti] driver: nouveau

Updated from desktop kernel.
Trouble booting because of change of display driver, twice.
Had to run drakX11 in a console to specify nouveau.

Deskyop fully populated.  Running this for a day.
Comment 9 Thomas Backlund 2021-01-29 17:44:38 CET
Thanks for testing, flushing it out

Whiteboard: (none) => MGA7-64-OK
CC: (none) => sysadmin-bugs
Keywords: (none) => advisory, validated_update

Comment 10 Mageia Robot 2021-01-29 20:06:48 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0058.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.