Lucene search

K
mageiaGentoo FoundationMGASA-2021-0191
HistoryApr 18, 2021 - 5:50 p.m.

Updated kernel-linus packages fix security vulnerabilities

2021-04-1817:50:05
Gentoo Foundation
advisories.mageia.org
23

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.9%

This kernel-linus update is based on upstream 5.10.30 and fixes at least the following security issues: nfc: fix refcount leak in llcp_sock_bind() (CVE-2020-25670) nfc: fix refcount leak in llcp_sock_connect() (CVE-2020-25671) nfc: fix memory leak in llcp_sock_connect() (CVE-2020-25672) firewire: nosy: Fix a use-after-free bug in nosy_ioctl() (CVE-2021-3483) BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context (CVE-2021-29154). KVM: SVM: load control fields from VMCB12 before checking them (CVE-2021-29657). For other upstream fixes, see the referenced changelogs.

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.9%