{"id":"MGASA-2021-0084","summary":"Updated kernel packages fix security vulnerability","details":"This kernel update is based on upstream 5.10.14 and fixes at least the\nfollowing security issues:\n\nA local privilege escalation was discovered in the Linux kernel before\n5.10.13. Multiple race conditions in the AF_VSOCK implementation are\ncaused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708).\n\nIt also adds the following fixes:\n- make CONNECTOR builtin to enable PROC_EVENTS (mga#28312)\n- drm/amd/display: Revert \"Fix EDID parsing after resume from suspend\"\n- drm/amdgpu: fix the issue that retry constantly once the buffer is oversize\n- drm/amdgpu: set default value of noretry to 1 for vega10\n- drm/amdgpu: default noretry=0 for navi1x and newer\n- drm/amdkfd: fix null pointer panic while free buffer in kfd\n- mm: thp: fix MADV_REMOVE deadlock on shmem THP\n\nFor other upstream fixes, see the referenced changelogs.\n","modified":"2026-04-16T04:40:39.119603948Z","published":"2021-02-15T19:24:33Z","upstream":["CVE-2021-26708"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0084.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28340"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28312"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.14"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.14-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0084.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.18-6.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0084.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.13-12.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0084.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}