Updated kernel-linus packages fix security vulnerabilities
Publication date: 22 Jul 2021Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-3609 , CVE-2021-3655 , CVE-2021-33909
Description
This kernel-linus update is based on upstream 5.10.52 and fixes at least the following security issues: There is a race condition in net/can/bcm.c that can lead to local privilege escalation to root (CVE-2021-3609). A vulnerability was found in the Linux kernel. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory (CVE-2021-3655). fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user (CVE-2021-33909). For other upstream fixes, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=29272
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.49
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.50
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.51
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.52
- https://www.openwall.com/lists/oss-security/2021/06/19/1
- https://www.openwall.com/lists/oss-security/2021/07/20/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909
SRPMS
8/core
- kernel-linus-5.10.52-1.mga8