MGASA-2021-0398

Source
https://advisories.mageia.org/MGASA-2021-0398.html
Import Source
https://advisories.mageia.org/MGASA-2021-0398.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0398
Related
Published
2021-08-07T09:31:15Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This kernel-linus update is based on upstream 5.10.56 and fixes at least the following security issues:

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (CVE-2021-34556).

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value (CVE-2021-35477).

For other upstream fixes, see the referenced changelogs.

References
Credits

Affected packages

Mageia:8 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.56-1.mga8

Ecosystem specific

{
    "section": "core"
}