Bug 29814 - Update request: kernel-linus-5.15.11-1.mga8
Summary: Update request: kernel-linus-5.15.11-1.mga8
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-12-24 20:37 CET by Thomas Backlund
Modified: 2021-12-29 20:14 CET (History)
2 users (show)

See Also:
Source RPM: kernel-linus
CVE:
Status comment:


Attachments

Description Thomas Backlund 2021-12-24 20:37:06 CET
Security and bugfixes, advisory will follow...

SRPM:
kernel-linus-5.15.11-1.mga8.src.rpm


i586:
kernel-linus-5.15.11-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-5.15.11-1.mga8-1-1.mga8.i586.rpm
kernel-linus-devel-latest-5.15.11-1.mga8.i586.rpm
kernel-linus-doc-5.15.11-1.mga8.noarch.rpm
kernel-linus-latest-5.15.11-1.mga8.i586.rpm
kernel-linus-source-5.15.11-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.11-1.mga8.noarch.rpm


x86_64:
kernel-linus-5.15.11-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-5.15.11-1.mga8-1-1.mga8.x86_64.rpm
kernel-linus-devel-latest-5.15.11-1.mga8.x86_64.rpm
kernel-linus-doc-5.15.11-1.mga8.noarch.rpm
kernel-linus-latest-5.15.11-1.mga8.x86_64.rpm
kernel-linus-source-5.15.11-1.mga8-1-1.mga8.noarch.rpm
kernel-linus-source-latest-5.15.11-1.mga8.noarch.rpm
Comment 1 Thomas Backlund 2021-12-24 21:21:14 CET
advisory, added to svn:

type: security
subject: Updated kernel-linus packages fix security vulnerabilities
CVE:
 - CVE-2021-28711
 - CVE-2021-28712
 - CVE-2021-28713
 - CVE-2021-28714
 - CVE-2021-28715
src:
  8:
   core:
     - kernel-linus-5.15.11-1.mga8
description: |
  This kernel-linus update is based on upstream 5.15.11 and fixes atleast the
  following security issues:

  Potentially malicious XEN PV backends can cause guest DoS due to unhardened
  frontends in the guests, even though this ought to have been prevented by
  containing them within a driver domain. This update fixes the issue tracked
  as XSA-391: blkfront (CVE-2021-28711), netfront (CVE-2021-28712),
  hvc_xen (CVE-2021-28713).

  The Linux kernel's xen-netback backend driver can be forced by guests to
  queue arbitrary amounts of network data, finally causing an out of memory
  situation in the domain the backend is running in (usually dom0). This
  update fixes the issues tracked as XSA-392 (CVE-2021-28714, CVE-2021-28715).

  For other upstream fixes, see the referenced changelogs.
references:
 - https://bugs.mageia.org/show_bug.cgi?id=29814
 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11
 - https://xenbits.xen.org/xsa/advisory-391.html
 - https://xenbits.xen.org/xsa/advisory-392.html

Keywords: (none) => advisory

Comment 2 Len Lawrence 2021-12-29 18:52:19 CET
Installed all the packages and rebooted without fuss.
5.15.11-1.mga8 x86_64
Quad Core Intel Core i7
GTX 970 - nvidia 470.94 

Mate desktop established without any changes.  NFS shares and NAS available.  Mageia clients launched in virtualbox.
Set up bluetooth and connected to audio device.  Sound and video OK.
DVB-T/T2 works via USB adapter.

CC: (none) => tarazed25

Comment 3 Thomas Backlund 2021-12-29 19:33:46 CET
Thanks for the test, flushing it out

Whiteboard: (none) => MGA8-64-OK
Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 4 Mageia Robot 2021-12-29 20:14:27 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0589.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.