MGASA-2021-0085

Source
https://advisories.mageia.org/MGASA-2021-0085.html
Import Source
https://advisories.mageia.org/MGASA-2021-0085.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0085
Related
Published
2021-02-15T19:24:33Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This kernel-linus update is based on upstream 5.10.14 and fixes at least the following security issues:

nbdaddsocket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndbqueuerq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (CVE-2021-3348).

A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AFVSOCK implementation are caused by wrong locking in net/vmwvsock/af_vsock.c (CVE-2021-26708).

It also adds the following fixes: - make CONNECTOR builtin to enable PROC_EVENTS (mga#28312)

For other upstream fixes, see the referenced changelogs.

References
Credits

Affected packages

Mageia:7 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.14-1.mga7

Ecosystem specific

{
    "section": "core"
}