MGASA-2021-0151 - Updated kernel packages fix security issues

Publication date: 22 Mar 2021
URL: https://advisories.mageia.org/MGASA-2021-0151.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2020-27170,
     CVE-2020-27171,
     CVE-2021-27363,
     CVE-2021-27364,
     CVE-2021-27365,
     CVE-2021-28375

This kernel update is based on upstream 5.10.25 and fixes atleast the
following security issues:

Unprivileged BPF programs running on affected systems can bypass the
protection and execute speculatively out-of-bounds loads from any location
within the kernel memory. This can be abused to extract contents of kernel
memory via side-channel (CVE-2020-27170).

Unprivileged BPF programs running on affected 64-bit systems can exploit
this to execute speculatively out-of-bounds loads from 4GB window within
the kernel memory. This can be abused to extract contents of kernel memory
via side-channel (CVE-2020-27171).

An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer
leak can be used to determine the address of the iscsi_transport structure.
When an iSCSI transport is registered with the iSCSI subsystem, the
transport's handle is available to unprivileged users via the sysfs file
system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the
show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is
called, which leaks the handle. This handle is actually the pointer to an
iscsi_transport struct in the kernel module's global variables
(CVE-2021-27363).

An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/
scsi_transport_iscsi.c is adversely affected by the ability of an
unprivileged user to craft Netlink messages (CVE-2021-27364).

An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI
data structures do not have appropriate length constraints or checks, and
can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink
message that is associated with iSCSI, and has a length up to the maximum
length of a Netlink message (CVE-2021-27365).

An issue was discovered in the Linux kernel through 5.11.6.
fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user
applications from sending kernel RPC messages (CVE-2021-28375).

It also adds the following fixes:
- arm(64): enable W1_MASTER_GPIO (mga#28596)
- wireguard-tools have been updated to v1.0.20210315

For other upstream fixes, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=28610
- https://bugs.mageia.org/show_bug.cgi?id=28596
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.21
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.22
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.23
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.24
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.25
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28375

SRPMS:
- 7/core/kernel-5.10.25-1.mga7
- 7/core/kmod-virtualbox-6.1.18-11.mga7
- 7/core/kmod-xtables-addons-3.13-17.mga7
- 7/core/wireguard-tools-1.0.20210315-1.mga7
- 8/core/kernel-5.10.25-1.mga8
- 8/core/kmod-virtualbox-6.1.18-21.mga8
- 8/core/kmod-xtables-addons-3.13-37.mga8
- 8/core/wireguard-tools-1.0.20210315-1.mga8