Lucene search

K
mageiaGentoo FoundationMGASA-2021-0398
HistoryAug 07, 2021 - 12:31 p.m.

Updated kernel-linus packages fix security vulnerabilities

2021-08-0712:31:15
Gentoo Foundation
advisories.mageia.org
28

0.0005 Low

EPSS

Percentile

15.6%

This kernel-linus update is based on upstream 5.10.56 and fixes at least the following security issues: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (CVE-2021-34556). In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value (CVE-2021-35477). For other upstream fixes, see the referenced changelogs.

OSVersionArchitecturePackageVersionFilename
Mageia8noarchkernel-linus< 5.10.56-1kernel-linus-5.10.56-1.mga8