Advisories ยป MGASA-2021-0460

Updated kernel-linus packages fix security vulnerabilities

Publication date: 04 Oct 2021
Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2020-16119 , CVE-2021-40490 , CVE-2021-41073

Description

This kernel-linus update is based on upstream 5.10.70 and fixes at least
the following security issues:

Use-after-free vulnerability in the Linux kernel exploitable by a local
attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid
object as a listener after being released (CVE-2020-16119).

A race condition was discovered in ext4_write_inline_data_end in
fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13
(CVE-2021-40490).

oop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows
local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger
a free of a kernel buffer, as demonstrated by using /proc//maps for
exploitation (CVE-2021-41073).

For other upstream fixes, see the referenced changelogs.
                

References

SRPMS

8/core