Security and bugfixes, advisory will follow... SRPM: kernel-linus-5.15.10-1.mga8.src.rpm i586: kernel-linus-5.15.10-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-5.15.10-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-latest-5.15.10-1.mga8.i586.rpm kernel-linus-doc-5.15.10-1.mga8.noarch.rpm kernel-linus-latest-5.15.10-1.mga8.i586.rpm kernel-linus-source-5.15.10-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.10-1.mga8.noarch.rpm x86_64: kernel-linus-5.15.10-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-5.15.10-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-latest-5.15.10-1.mga8.x86_64.rpm kernel-linus-doc-5.15.10-1.mga8.noarch.rpm kernel-linus-latest-5.15.10-1.mga8.x86_64.rpm kernel-linus-source-5.15.10-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.15.10-1.mga8.noarch.rpm
Advisory, added to svn: type: security subject: Updated kernel-linus packages fix security vulnerabilities CVE: - CVE-2021-4083 - CVE-2021-39685 - CVE-2021-43975 src: 8: core: - kernel-linus-5.15.10-1.mga8 description: | This kernel-linus update is based on upstream 5.15.10 and fixes atleast the following security issues: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system (CVE-2021-4083). An attacker can access kernel memory bypassing valid buffer boundaries by exploiting implementation of control request handlers in the following usb gadgets - rndis, hid, uac1, uac1_legacy and uac2. Processing of malicious control transfer requests with unexpectedly large wLength lacks assurance that this value does not exceed the buffer size. Due to this fact one is capable of reading and/or writing (depending on particular case) up to 65k of kernel memory. Devices implementing affected usb device gadget classes may be affected by buffer overflow vulnerabilities resulting in information disclosure, denial of service or execution of arbitrary code in kernel context (CVE-2021-39685). In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (CVE-2021-43975). For other upstream fixes, see the referenced changelogs. references: - https://bugs.mageia.org/show_bug.cgi?id=29778 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.7 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.8 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.9 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.10
Severity: normal => majorPriority: Normal => HighKeywords: (none) => advisory
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugsWhiteboard: (none) => MGA8-64-OK
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0575.html
Status: NEW => RESOLVEDResolution: (none) => FIXED