Описание
ELSA-2020-5792: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.4.17-2011.4.6.el8uek]
- Revert 'uek-rpm: Move grub boot menu update to posttrans stage.' (Somasundaram Krishnasamy) [Orabug: 31358097]
[5.4.17-2011.4.5.el8uek]
- IB/sa: Resolv use-after-free in ib_nl_make_request() (Divya Indi) [Orabug: 31631527]
- certs: Remove Oracle cert compiled into the kernel (Eric Snowberg) [Orabug: 31555595]
- acpi: disallow loading configfs acpi tables when locked down (Jason A. Donenfeld) [Orabug: 31642981]
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
kernel-uek
5.4.17-2011.4.6.el7uek
kernel-uek-debug
5.4.17-2011.4.6.el7uek
kernel-uek-debug-devel
5.4.17-2011.4.6.el7uek
kernel-uek-devel
5.4.17-2011.4.6.el7uek
kernel-uek-doc
5.4.17-2011.4.6.el7uek
kernel-uek-tools
5.4.17-2011.4.6.el7uek
kernel-uek-tools-libs
5.4.17-2011.4.6.el7uek
perf
5.4.17-2011.4.6.el7uek
python-perf
5.4.17-2011.4.6.el7uek
Oracle Linux x86_64
kernel-uek
5.4.17-2011.4.6.el7uek
kernel-uek-debug
5.4.17-2011.4.6.el7uek
kernel-uek-debug-devel
5.4.17-2011.4.6.el7uek
kernel-uek-devel
5.4.17-2011.4.6.el7uek
kernel-uek-doc
5.4.17-2011.4.6.el7uek
kernel-uek-tools
5.4.17-2011.4.6.el7uek
Oracle Linux 8
Oracle Linux aarch64
kernel-uek
5.4.17-2011.4.6.el8uek
kernel-uek-debug
5.4.17-2011.4.6.el8uek
kernel-uek-debug-devel
5.4.17-2011.4.6.el8uek
kernel-uek-devel
5.4.17-2011.4.6.el8uek
kernel-uek-doc
5.4.17-2011.4.6.el8uek
Oracle Linux x86_64
kernel-uek
5.4.17-2011.4.6.el8uek
kernel-uek-debug
5.4.17-2011.4.6.el8uek
kernel-uek-debug-devel
5.4.17-2011.4.6.el8uek
kernel-uek-devel
5.4.17-2011.4.6.el8uek
kernel-uek-doc
5.4.17-2011.4.6.el8uek
Связанные CVE
Связанные уязвимости
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux k ...