Mageia 2021-0084: kernel security update
Summary
This kernel update is based on upstream 5.10.14 and fixes atleast the
following security issues:
A local privilege escalation was discovered in the Linux kernel before
5.10.13. Multiple race conditions in the AF_VSOCK implementation are
caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708).
It also adds the following fixes:
- make CONNECTOR builtin to enable PROC_EVENTS (mga#28312)
- drm/amd/display: Revert "Fix EDID parsing after resume from suspend"
- drm/amdgpu: fix the issue that retry constantly once the buffer is oversize
- drm/amdgpu: set default value of noretry to 1 for vega10
- drm/amdgpu: default noretry=0 for navi1x and newer
- drm/amdkfd: fix null pointer panic while free buffer in kfd
- mm: thp: fix MADV_REMOVE deadlock on shmem THP
For other upstream fixes, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=28340
- https://bugs.mageia.org/show_bug.cgi?id=28312
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.14
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26708
Resolution
MGASA-2021-0084 - Updated kernel packages fix security vulnerability
SRPMS
- 7/core/kernel-5.10.14-1.mga7
- 7/core/kmod-virtualbox-6.1.18-6.mga7
- 7/core/kmod-xtables-addons-3.13-12.mga7