MGASA-2021-0295

Source
https://advisories.mageia.org/MGASA-2021-0295.html
Import Source
https://advisories.mageia.org/MGASA-2021-0295.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0295
Related
Published
2021-06-28T21:16:35Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This kernel-linus update is based on upstream 5.10.46 and fixes at least the following security issues:

In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack (CVE-2021-33624).

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693).

For other upstream fixes, see the referenced changelog.

References
Credits

Affected packages

Mageia:7 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.46-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.46-1.mga8

Ecosystem specific

{
    "section": "core"
}