|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0366 (kernel)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0366: Updated kernel packages fix security vulnerabilities
Date:  Thu, 22 Jul 2021 09:09:04 +0200
Message-ID:  <20210722070904.E13BDA1211@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0366 - Updated kernel packages fix security vulnerabilities Publication date: 22 Jul 2021 URL: https://advisories.mageia.org/MGASA-2021-0366.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-3609, CVE-2021-33909 Description: This kernel update is based on upstream 5.10.52 and fixes atleast the following security issues: There is a race condition in net/can/bcm.c that can lead to local privilege escalation to root (CVE-2021-3609). fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user (CVE-2021-33909). Other fixes in this update: - rtl8xxxu: disable interrupt_in transfer for 8188cu and 8192cu For other upstream fixes, see the referenced changelogs. References: - https://bugs.mageia.org/show_bug.cgi?id=29271 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.... - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.... - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.... - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.... - https://www.openwall.com/lists/oss-security/2021/06/19/1 - https://www.openwall.com/lists/oss-security/2021/07/20/1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3... SRPMS: - 8/core/kernel-5.10.52-1.mga8 - 8/core/kmod-virtualbox-6.1.22-1.12.mga8 - 8/core/kmod-xtables-addons-3.18-1.12.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds