Описание
ELSA-2020-2102: kernel security and bug fix update (IMPORTANT)
[4.18.0-193.1.2_2.OL8]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
[4.18.0-193.1.2_2]
- [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827249 1827251] {CVE-2020-10711}
- [mm] s390/mm: fix page table upgrade vs 2ndary address mode accesses (Vladis Dronov) [1828153 1828154] {CVE-2020-11884}
[4.18.0-193.1.1_2]
- [x86] kvm: x86: clear stale x86_emulate_ctxt->intercept value (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
- [x86] kvm: vmx: check descriptor table exits on instruction emulation (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
- [x86] kvm: nvmx: Check IO instruction VM-exit conditions (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
- [x86] kvm: nvmx: Refactor IO bitmap checks into helper function (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
- [x86] kvm: nvmx: Don't emulate instructions in guest mode (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
- [sound] ALSA: usb-audio: set the interface format after resume on Dell WD19 (Perry Yuan) [1821376 1807965]
- [kernel] sched: Avoid scale real weight down to zero (Phil Auld) [1819909 1808562]
- [netdrv] hv_netvsc: Fix unwanted rx_table reset (Mohammed Gamal) [1817945 1805950]
- [netdrv] hv_netvsc: Fix tx_table init in rndis_set_subchannel() (Mohammed Gamal) [1817945 1805950]
- [netdrv] hv_netvsc: Fix send_table offset in case of a host bug (Mohammed Gamal) [1817945 1805950]
- [netdrv] hv_netvsc: Fix offset usage in netvsc_send_table() (Mohammed Gamal) [1817945 1805950]
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
bpftool
4.18.0-193.1.2.el8_2
kernel-cross-headers
4.18.0-193.1.2.el8_2
kernel-headers
4.18.0-193.1.2.el8_2
kernel-tools
4.18.0-193.1.2.el8_2
kernel-tools-libs
4.18.0-193.1.2.el8_2
kernel-tools-libs-devel
4.18.0-193.1.2.el8_2
perf
4.18.0-193.1.2.el8_2
python3-perf
4.18.0-193.1.2.el8_2
Oracle Linux x86_64
bpftool
4.18.0-193.1.2.el8_2
kernel
4.18.0-193.1.2.el8_2
kernel-abi-whitelists
4.18.0-193.1.2.el8_2
kernel-core
4.18.0-193.1.2.el8_2
kernel-cross-headers
4.18.0-193.1.2.el8_2
kernel-debug
4.18.0-193.1.2.el8_2
kernel-debug-core
4.18.0-193.1.2.el8_2
kernel-debug-devel
4.18.0-193.1.2.el8_2
kernel-debug-modules
4.18.0-193.1.2.el8_2
kernel-debug-modules-extra
4.18.0-193.1.2.el8_2
kernel-devel
4.18.0-193.1.2.el8_2
kernel-doc
4.18.0-193.1.2.el8_2
kernel-headers
4.18.0-193.1.2.el8_2
kernel-modules
4.18.0-193.1.2.el8_2
kernel-modules-extra
4.18.0-193.1.2.el8_2
kernel-tools
4.18.0-193.1.2.el8_2
kernel-tools-libs
4.18.0-193.1.2.el8_2
kernel-tools-libs-devel
4.18.0-193.1.2.el8_2
perf
4.18.0-193.1.2.el8_2
python3-perf
4.18.0-193.1.2.el8_2
Связанные CVE
Связанные уязвимости
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
A flaw was discovered in the way that the KVM hypervisor handled instr ...
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.