Updated kernel packages fix security vulnerability
Publication date: 15 Feb 2021Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 7
CVE: CVE-2021-26708
Description
This kernel update is based on upstream 5.10.14 and fixes at least the following security issues: A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708). It also adds the following fixes: - make CONNECTOR builtin to enable PROC_EVENTS (mga#28312) - drm/amd/display: Revert "Fix EDID parsing after resume from suspend" - drm/amdgpu: fix the issue that retry constantly once the buffer is oversize - drm/amdgpu: set default value of noretry to 1 for vega10 - drm/amdgpu: default noretry=0 for navi1x and newer - drm/amdkfd: fix null pointer panic while free buffer in kfd - mm: thp: fix MADV_REMOVE deadlock on shmem THP For other upstream fixes, see the referenced changelogs.
References
SRPMS
7/core
- kernel-5.10.14-1.mga7
- kmod-virtualbox-6.1.18-6.mga7
- kmod-xtables-addons-3.13-12.mga7