Bug 29629 - Update request: kernel-linus-5.10.78-1.mga8
Summary: Update request: kernel-linus-5.10.78-1.mga8
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-11-07 11:37 CET by Thomas Backlund
Modified: 2021-11-11 16:03 CET (History)
2 users (show)

See Also:
Source RPM: kernel-linus
CVE:
Status comment:


Attachments

Description Thomas Backlund 2021-11-07 11:37:57 CET
security and bugfixes, advisory will follow...


SRPMS:
kernel-linus-5.10.78-1.mga8.src.rpm


i586:
kernel-linus-5.10.78-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-5.10.78-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-latest-5.10.78-1.mga8.i586.rpm
kernel-linus-doc-5.10.78-1.mga8.noarch.rpm
kernel-linus-latest-5.10.78-1.mga8.i586.rpm
kernel-linus-source-5.10.78-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.10.78-1.mga8.noarch.rpm


x86_64:
kernel-linus-5.10.78-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-5.10.78-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-latest-5.10.78-1.mga8.x86_64.rpm
kernel-linus-doc-5.10.78-1.mga8.noarch.rpm
kernel-linus-latest-5.10.78-1.mga8.x86_64.rpm
kernel-linus-source-5.10.78-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.10.78-1.mga8.noarch.rpm
Comment 1 Thomas Backlund 2021-11-07 12:55:19 CET
Advisory, added to svn:

type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
 - CVE-2021-3760
 - CVE-2021-3772
 - CVE-2021-42327
 - CVE-2021-43267
 - CVE-2021-43389
src:
  8:
   core:
     - kernel-linus-5.10.78-1.mga8
description: |
  This kernel-linus update is based on upstream 5.10.78 and fixes atleast
  the following security issues:

  A use-after-free vulnerability in the NFC stack can lead to a threat to
  confidentiality, integrity, and system availability (CVE-2021-3760).

  A flaw in the SCTP stack where a blind attacker may be able to kill an
  existing SCTP association through invalid chunks if the attacker knows
  the IP-addresses and port numbers being used and the attacker can send
  packets with spoofed IP addresses (CVE-2021-3772).

  A flaw heap buffer overflow in the Linux kernel's AMD Radeon graphics
  card driver was found in the way user writes some malicious data to the
  AMD GPU Display Driver Debug Filesystem (to the VGA sub-directory of the
  /sys/kernel/debug/ directory). A local user could use this flaw to crash
  the system or escalate their privileges on the system (CVE-2021-42327).

  A flaw was discovered in the cryptographic receive code in the Linux
  kernel's implementation of transparent interprocess communication. An
  attacker, with the ability to send TIPC messages to the target, can
  corrupt memory and escalate privileges on the target system
  (CVE-2021-43267).

  An issue was discovered in the Linux kernel before 5.14.15. There is an
  array-index-out-of-bounds flaw in the detach_capi_ctr function in
  drivers/isdn/capi/kcapi.c (CVE-2021-43389).

  For other upstream fixes, see the referenced changelogs. 
references:
 - https://bugs.mageia.org/show_bug.cgi?id=29629
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.76
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.77
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.78

Keywords: (none) => advisory

Comment 2 Len Lawrence 2021-11-10 20:49:43 CET
Updated smoothly from kernel-linus-5.10.70.
nvidia graphics driver rebuilt before the reboot.

Kernel: 5.10.78-1.mga8 x86_64 
Quad Core Intel Core i7-479
NVIDIA GM204 [GeForce GTX 970] driver: nvidia v: 470.74

Mate desktop running, NFS shares auto-mounted.
Bluetooth with btusb worked after a lot of floundering around between blueman and bluetoothctl.  Sometimes bluetooth is your friend, other times it starts off in a very bad mood.
Everything else seems to be working as normal.
81 package scheduled update including kernel-desktop-5.10.75.

CC: (none) => tarazed25

Thomas Backlund 2021-11-11 15:21:24 CET

Keywords: (none) => validated_update
Whiteboard: (none) => MGA8-64-OK
CC: (none) => sysadmin-bugs

Comment 3 Mageia Robot 2021-11-11 16:03:50 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0508.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.