Updated kernel-linus packages fix security vulnerabilities
Publication date: 29 Jan 2021Type: security
Affected Mageia releases : 7
CVE: CVE-2020-28374 , CVE-2021-3178
Description
This kernel-linus update is based on upstream 5.10.11 and fixes at least the following security issue: SCSI “EXTENDED COPY” (XCOPY) requests sent to a Linux SCSI target (LIO) allow an attacker to read or write anywhere on any LIO backstore configured on the host, provided the attacker has access to one LUN and knowledge of the victim backstore’s vpd_unit_serial (AKA “wwn”). This is possible regardless of the transport/HBA settings for the victim backstore (CVE-2020-28374). fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS (CVE-2021-3178). It also adds the following fix: - fix up kernel-devel packages to not cause errors during dkms installs (mga#27080)
References
- https://bugs.mageia.org/show_bug.cgi?id=28164
- https://bugs.mageia.org/show_bug.cgi?id=27080
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.8
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.9
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.11
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178
SRPMS
7/core
- kernel-linus-5.10.11-1.mga7