Mageia 2021-0366: kernel security update | LinuxSecurity.com

Advisories

MGASA-2021-0366 - Updated kernel packages fix security vulnerabilities

Publication date: 22 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0366.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-3609,
     CVE-2021-33909

This kernel update is based on upstream 5.10.52 and fixes atleast the
following security issues:

There is a race condition in net/can/bcm.c that can lead to local
privilege escalation to root (CVE-2021-3609).

fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does
not properly restrict seq buffer allocations, leading to an integer
overflow, an Out-of-bounds Write, and escalation to root by an unprivileged
user (CVE-2021-33909).

Other fixes in this update:
- rtl8xxxu: disable interrupt_in transfer for 8188cu and 8192cu

For other upstream fixes, see the referenced changelogs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=29271
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.49
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.50
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.51
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.52
- https://www.openwall.com/lists/oss-security/2021/06/19/1
- https://www.openwall.com/lists/oss-security/2021/07/20/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909

SRPMS:
- 8/core/kernel-5.10.52-1.mga8
- 8/core/kmod-virtualbox-6.1.22-1.12.mga8
- 8/core/kmod-xtables-addons-3.18-1.12.mga8

Mageia 2021-0366: kernel security update

This kernel update is based on upstream 5.10.52 and fixes atleast the following security issues: There is a race condition in net/can/bcm.c that can lead to local privilege escala...

Summary

This kernel update is based on upstream 5.10.52 and fixes atleast the following security issues:
There is a race condition in net/can/bcm.c that can lead to local privilege escalation to root (CVE-2021-3609).
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user (CVE-2021-33909).
Other fixes in this update: - rtl8xxxu: disable interrupt_in transfer for 8188cu and 8192cu
For other upstream fixes, see the referenced changelogs.

References

- https://bugs.mageia.org/show_bug.cgi?id=29271

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.49

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.50

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.51

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.52

- https://www.openwall.com/lists/oss-security/2021/06/19/1

- https://www.openwall.com/lists/oss-security/2021/07/20/1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909

Resolution

MGASA-2021-0366 - Updated kernel packages fix security vulnerabilities

SRPMS

- 8/core/kernel-5.10.52-1.mga8

- 8/core/kmod-virtualbox-6.1.22-1.12.mga8

- 8/core/kmod-xtables-addons-3.18-1.12.mga8

Severity
Publication date: 22 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0366.html
Type: security
CVE: CVE-2021-3609, CVE-2021-33909

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.