{"id":"MGASA-2021-0397","summary":"Updated kernel packages fix security vulnerabilities","details":"This kernel update is based on upstream 5.10.56 and fixes at least the\nfollowing security issues:\n\nIn the Linux kernel through 5.13.7, an unprivileged BPF program can\nobtain sensitive information from kernel memory via a Speculative Store\nBypass side-channel attack because the protection mechanism neglects the\npossibility of uninitialized memory locations on the BPF stack\n(CVE-2021-34556).\n\nIn the Linux kernel through 5.13.7, an unprivileged BPF program can\nobtain sensitive information from kernel memory via a Speculative Store\nBypass side-channel attack because a certain preempting store operation\ndoes not necessarily occur before a store operation that has an\nattacker-controlled value (CVE-2021-35477).\n\nOther fixes in this update:\n- btrfs: fix lost inode on log replay after mix of fsync, rename and\n  inode eviction\n- btrfs: fix race causing unnecessary inode logging during link and rename\n- watchdog: iTCO_wdt: Fix detection of SMI-off case (fixes sporadic reboots\n  on some systems)\n- Revert \"ACPICA: Fix memory leak caused by _CID repair function\", fixing\n  boot failures on some systems\n- fix another ACPI issue causing some systems to boot slowly or not at all\n  after kernel 5.10.50\n- revert: 'scsi: sr: Return appropriate error code when disk is ejected'\n  (fixes DVD opening on resume from suspend or standby, mga #29262)\n- Revert \"usb: renesas-xhci: Fix handling of unknown ROM state\"\n  (fixes renesas usb pci stopped working, mga #29285)\n- Revert \"drm/i915: Propagate errors on awaiting already signaled fences\"\n  and \"drm/i915/gem: Asynchronous cmdparser\" (fixes an issue where an\n  app hang can cause X server to hang)\n\nFor other upstream fixes, see the referenced changelogs.\n","modified":"2026-02-04T03:41:01.673355Z","published":"2021-08-07T09:31:15Z","related":["CVE-2021-34556","CVE-2021-35477"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0397.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29311"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29262"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29285"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.53"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.54"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.55"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.56"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.56-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0397.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.24-1.4.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0397.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.18-1.16.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0397.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}