MGASA-2021-0151 - Updated kernel packages fix security issues Publication date: 22 Mar 2021 URL: https://advisories.mageia.org/MGASA-2021-0151.html Type: security Affected Mageia releases: 7, 8 CVE: CVE-2020-27170, CVE-2020-27171, CVE-2021-27363, CVE-2021-27364, CVE-2021-27365, CVE-2021-28375 This kernel update is based on upstream 5.10.25 and fixes atleast the following security issues: Unprivileged BPF programs running on affected systems can bypass the protection and execute speculatively out-of-bounds loads from any location within the kernel memory. This can be abused to extract contents of kernel memory via side-channel (CVE-2020-27170). Unprivileged BPF programs running on affected 64-bit systems can exploit this to execute speculatively out-of-bounds loads from 4GB window within the kernel memory. This can be abused to extract contents of kernel memory via side-channel (CVE-2020-27171). An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (CVE-2021-27363). An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/ scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages (CVE-2021-27364). An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (CVE-2021-27365). An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages (CVE-2021-28375). It also adds the following fixes: - arm(64): enable W1_MASTER_GPIO (mga#28596) - wireguard-tools have been updated to v1.0.20210315 For other upstream fixes, see the referenced changelogs. References: - https://bugs.mageia.org/show_bug.cgi?id=28610 - https://bugs.mageia.org/show_bug.cgi?id=28596 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.21 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.22 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.23 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.24 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.25 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28375 SRPMS: - 7/core/kernel-5.10.25-1.mga7 - 7/core/kmod-virtualbox-6.1.18-11.mga7 - 7/core/kmod-xtables-addons-3.13-17.mga7 - 7/core/wireguard-tools-1.0.20210315-1.mga7 - 8/core/kernel-5.10.25-1.mga8 - 8/core/kmod-virtualbox-6.1.18-21.mga8 - 8/core/kmod-xtables-addons-3.13-37.mga8 - 8/core/wireguard-tools-1.0.20210315-1.mga8