Advisories ยป MGASA-2021-0366

Updated kernel packages fix security vulnerabilities

Publication date: 22 Jul 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-3609 , CVE-2021-3655 , CVE-2021-33909

Description

This kernel update is based on upstream 5.10.52 and fixes at least the
following security issues:

There is a race condition in net/can/bcm.c that can lead to local
privilege escalation to root (CVE-2021-3609).

A vulnerability was found in the Linux kernel. Missing size validations on
inbound SCTP packets may allow the kernel to read uninitialized memory
(CVE-2021-3655).

fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does
not properly restrict seq buffer allocations, leading to an integer
overflow, an Out-of-bounds Write, and escalation to root by an unprivileged
user (CVE-2021-33909).

Other fixes in this update:
- rtl8xxxu: disable interrupt_in transfer for 8188cu and 8192cu

For other upstream fixes, see the referenced changelogs.
                

References

SRPMS

8/core