CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
19.0%
This kernel update is based on upstream 5.10.27 and fixes at least the following security issues: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn’t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. A malicious or buggy frontend driver may be able to cause resource leaks from the corresponding backend driver. This can result in a host-wide Denial of Sevice (DoS). (CVE-2021-28688 / XSA-371). An issue was discovered in fs/io_uring.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (deadlock) because exit may be waiting to park a SQPOLL thread, but concurrently that SQPOLL thread is waiting for a signal to start (CVE-2021-28951). A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation (CVE-2021-28964). In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled (CVE-2021-28971). In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name ‘\0’ termination (CVE-2021-28972). An issue was discovered in the Linux kernel before 5.11.9. drivers/vhost/ vdpa.c has a use-after-free because v->config_ctx has an invalid value upon re-opening a character device (CVE-2021-29266). It also adds the following fixes: - arm: enable OF_OVERLAY (mga#28596) - iomap: Fix negative assignment to unsigned sis->pages in iomap_swapfile_activate - thermal/core: Add NULL pointer check before using cooling device stats For other upstream fixes, see the referenced changelogs.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 7 | noarch | kernel | < 5.10.27-1 | kernel-5.10.27-1.mga7 |
Mageia | 7 | noarch | kmod-virtualbox | < 6.1.18-12 | kmod-virtualbox-6.1.18-12.mga7 |
Mageia | 7 | noarch | kmod-xtables-addons | < 3.13-18 | kmod-xtables-addons-3.13-18.mga7 |
Mageia | 8 | noarch | kernel | < 5.10.27-1 | kernel-5.10.27-1.mga8 |
Mageia | 8 | noarch | kmod-virtualbox | < 6.1.18-22 | kmod-virtualbox-6.1.18-22.mga8 |
Mageia | 8 | noarch | kmod-xtables-addons | < 3.13-38 | kmod-xtables-addons-3.13-38.mga8 |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
19.0%