Bug 29778 - Update request: kernel-linus-5.15.10-1.mga8
Summary: Update request: kernel-linus-5.15.10-1.mga8
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: High major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-12-17 20:54 CET by Thomas Backlund
Modified: 2021-12-22 00:28 CET (History)
1 user (show)

See Also:
Source RPM: kernel-linus
CVE:
Status comment:


Attachments

Description Thomas Backlund 2021-12-17 20:54:36 CET
Security and bugfixes, advisory will follow...


SRPM:
kernel-linus-5.15.10-1.mga8.src.rpm


i586:
kernel-linus-5.15.10-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-5.15.10-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-latest-5.15.10-1.mga8.i586.rpm
kernel-linus-doc-5.15.10-1.mga8.noarch.rpm
kernel-linus-latest-5.15.10-1.mga8.i586.rpm
kernel-linus-source-5.15.10-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.10-1.mga8.noarch.rpm


x86_64:
kernel-linus-5.15.10-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-5.15.10-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-latest-5.15.10-1.mga8.x86_64.rpm
kernel-linus-doc-5.15.10-1.mga8.noarch.rpm
kernel-linus-latest-5.15.10-1.mga8.x86_64.rpm
kernel-linus-source-5.15.10-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.10-1.mga8.noarch.rpm
Comment 1 Thomas Backlund 2021-12-18 18:12:14 CET
Advisory, added to svn:

type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
 - CVE-2021-4083
 - CVE-2021-39685
 - CVE-2021-43975
src:
  8:
   core:
     - kernel-linus-5.15.10-1.mga8
description: |
  This kernel-linus update is based on upstream 5.15.10 and fixes atleast the
  following security issues:

  A read-after-free memory flaw was found in the Linux kernel's garbage
  collection for Unix domain socket file handlers in the way users call
  close() and fget() simultaneously and can potentially trigger a race
  condition. This flaw allows a local user to crash the system or escalate
  their privileges on the system (CVE-2021-4083).

  An attacker can access kernel memory bypassing valid buffer boundaries by
  exploiting implementation of control request handlers in the following usb
  gadgets - rndis, hid, uac1, uac1_legacy and uac2. Processing of malicious
  control transfer requests with unexpectedly large wLength lacks assurance
  that this value does not exceed the buffer size. Due to this fact one is
  capable of reading and/or writing (depending on particular case) up to 65k
  of kernel memory. Devices implementing affected usb device gadget classes
  may be affected by buffer overflow vulnerabilities resulting in information
  disclosure, denial of service or execution of arbitrary code in kernel
  context (CVE-2021-39685).

  In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/
  ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can
  introduce a crafted device) to trigger an out-of-bounds write via a crafted
  length value (CVE-2021-43975).

  For other upstream fixes, see the referenced changelogs.
references:
 - https://bugs.mageia.org/show_bug.cgi?id=29778
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.7
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.8
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.9
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.10

Severity: normal => major
Priority: Normal => High
Keywords: (none) => advisory

Thomas Backlund 2021-12-21 23:46:15 CET

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs
Whiteboard: (none) => MGA8-64-OK

Comment 2 Mageia Robot 2021-12-22 00:28:53 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0575.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.