CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
24.2%
This kernel update is based on upstream 5.10.46 and fixes at least the following security issues: In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack (CVE-2021-33624). net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693). For other upstream fixes, see the referenced changelog.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 7 | noarch | kernel | < 5.10.46-1 | kernel-5.10.46-1.mga7 |
Mageia | 7 | noarch | kmod-virtualbox | < 6.1.22-1.9 | kmod-virtualbox-6.1.22-1.9.mga7 |
Mageia | 7 | noarch | kmod-xtables-addons | < 3.13-31 | kmod-xtables-addons-3.13-31.mga7 |
Mageia | 8 | noarch | kernel | < 5.10.46-1 | kernel-5.10.46-1.mga8 |
Mageia | 8 | noarch | kmod-virtualbox | < 6.1.22-1.9 | kmod-virtualbox-6.1.22-1.9.mga8 |
Mageia | 8 | noarch | kmod-xtables-addons | < 3.18-1.9 | kmod-xtables-addons-3.18-1.9.mga8 |
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
24.2%