MGASA-2021-0419

Source
https://advisories.mageia.org/MGASA-2021-0419.html
Import Source
https://advisories.mageia.org/MGASA-2021-0419.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0419
Related
Published
2021-09-08T09:23:46Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This kernel-linus update is based on upstream 5.10.62 and fixes at least the following security issues:

Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic in ath9k (CVE-2020-3702).

A process with CAPSYSADMIN can cause a kernel NULL pointer dereference in btrfs code (CVE-2021-3739).

there is an out-of-bound read bug in qrtrendpointpost in net/qrtr/qrtr.c (CVE-2021-3743).

An out-of-bounds read due to a race condition has been found in the Linux kernel due to write access to vcmode is not protected by a lock in vtioctl (KDSETMDE) (CVE-2021-3753).

For other upstream fixes, see the referenced changelogs.

References
Credits

Affected packages

Mageia:8 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.62-1.mga8

Ecosystem specific

{
    "section": "core"
}