Mageia 2021-0574: kernel security update
Summary
This kernel update is based on upstream 5.15.10 and fixes atleast the
following security issues:
A read-after-free memory flaw was found in the Linux kernel's garbage
collection for Unix domain socket file handlers in the way users call
close() and fget() simultaneously and can potentially trigger a race
condition. This flaw allows a local user to crash the system or escalate
their privileges on the system (CVE-2021-4083).
An attacker can access kernel memory bypassing valid buffer boundaries by
exploiting implementation of control request handlers in the following usb
gadgets - rndis, hid, uac1, uac1_legacy and uac2. Processing of malicious
control transfer requests with unexpectedly large wLength lacks assurance
that this value does not exceed the buffer size. Due to this fact one is
capable of reading and/or writing (depending on particular case) up to 65k
of kernel memory. Devices implementing affected usb device gadget classes
may be affected by buffer overflow vulnerabilities ...
References
- https://bugs.mageia.org/show_bug.cgi?id=29777
- https://bugs.mageia.org/show_bug.cgi?id=29704
- https://bugs.mageia.org/show_bug.cgi?id=29711
- https://bugs.mageia.org/show_bug.cgi?id=29760
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.7
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.8
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.9
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.10
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
Resolution
MGASA-2021-0574 - Updated kernel packages fix security vulnerabilities
SRPMS
- 8/core/kernel-5.15.10-1.mga8
- 8/core/kmod-virtualbox-6.1.30-1.5.mga8
- 8/core/kmod-xtables-addons-3.18-1.38.mga8
![Dist Mageia](/images/distros/dist-mageia.jpg)