Summary: | kernel: Privilege escalation via AF_VSOCK implementation (CVE-2021-26708) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | hydrapolic |
Priority: | High | Keywords: | CC-ARCHES, STABLEREQ |
Version: | unspecified | Flags: | nattka:
sanity-check+
|
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A1 [stable] | ||
Package list: |
sys-kernel/gentoo-sources-5.4.97
sys-kernel/gentoo-sources-4.19.175
sys-kernel/gentoo-sources-4.14.221
sys-kernel/gentoo-sources-4.9.257
sys-kernel/gentoo-sources-4.4.257
|
Runtime testing required: | --- |
Bug Depends on: | |||
Bug Blocks: | 767892 |
Description
Sam James
2021-02-05 17:35:09 UTC
Affects >=linux-5.5 (every kernel which has c0cfa2d8a788fcf45df5bf4070ab2474c88d543a). Combining with stabilization from bug 767892. CVE-2021-3347 still needs another round for 4.4 and 4.9 :/ Unable to check for sanity:
> no match for package: sys-kernel/gentoo-sources-4.9.257
Unable to check for sanity:
> no match for package: sys-kernel/gentoo-sources-5.10.15
All sanity-check issues have been resolved Skipping linux-5.10.x for now due to i915 regression. x86 stable amd64 stable ppc stable arm, arm64 done ppc64 stable spark marked stable under kernel project policy. All done. |