MGASA-2021-0296 - Updated kernel packages fix security vulnerabilities

Publication date: 28 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0296.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2021-33624,
     CVE-2021-34693

This kernel update is based on upstream 5.10.46 and fixes atleast the
following security issues:

In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can
be mispredicted (e.g., because of type confusion) and consequently an
unprivileged BPF program can read arbitrary memory locations via a
side-channel attack (CVE-2021-33624).

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to
obtain sensitive information from kernel stack memory because parts of a
data structure are uninitialized. (CVE-2021-34693).

For other upstream fixes, see the referenced changelog.

References:
- https://bugs.mageia.org/show_bug.cgi?id=29173
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.46
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693

SRPMS:
- 8/core/kernel-5.10.46-1.mga8
- 8/core/kmod-virtualbox-6.1.22-1.9.mga8
- 8/core/kmod-xtables-addons-3.18-1.9.mga8
- 7/core/kernel-5.10.46-1.mga7
- 7/core/kmod-virtualbox-6.1.22-1.9.mga7
- 7/core/kmod-xtables-addons-3.13-31.mga7