Описание
ELSA-2021-3327: kernel security and bug fix update (IMPORTANT)
[3.10.0-1160.41.1.OL7]
- Update Oracle Linux certificates (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-2.0.9
- Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)
[3.10.0-1160.41.1]
- ixgbe: fix warning: sysfs: cannot create duplicate filename (Daniel Vacek) [1915449]
[3.10.0-1160.40.1]
- redhat: ppc64: CONFIG_RTAS_FILTER (Aristeu Rozanski) [1906443] {CVE-2020-27777}
- powerpc/rtas: Fix typo of ibm,open-errinjct in RTAS filter (Aristeu Rozanski) [1906443] {CVE-2020-27777}
- powerpc/rtas: Restrict RTAS requests from userspace (Aristeu Rozanski) [1906443] {CVE-2020-27777}
- IB/mlx5: Fix initializing CQ fragments buffer (Alaa Hleihel) [1962499]
[3.10.0-1160.39.1]
- netfilter: x_tables: fix compat match/target pad out-of-bound write (Florian Westphal) [1980489] {CVE-2021-22555}
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (Petr Oros) [1971744]
- futex: futex_requeue can potentially free the pi_state structure twice (Donghai Qiao) [1966856]
- xfs: sync lazy sb accounting on quiesce of read-only mounts (Carlos Maiolino) [1921551]
- scsi: lpfc: Fix crash caused by switch reboot (Dick Kennedy) [1897576]
[3.10.0-1160.38.1]
- seq_file: Disallow extremely large seq buffer allocations (Ian Kent) [1975251]
- memcg, slab: Fix incorrect placement of rcu_head in struct memcg_cache_params (Waiman Long) [1951810]
- netfilter: x_tables: Use correct memory barriers. (Phil Sutter) [1949087] {CVE-2021-29650}
- netfilter: nf_nat: don't bug when mapping already exists (Florian Westphal) [1972970]
- netfilter: don't setup nat info for confirmed ct (Florian Westphal) [1972970]
[3.10.0-1160.37.1]
- bluetooth: eliminate the potential race condition when removing the HCI controller (Gopal Tiwari) [1971457]
- net: Update window_clamp if SOCK_RCVBUF is set (Balazs Nemeth) [1962196]
- bpf, x86: Validate computation of branch displacements for x86-64 (Jiri Olsa) [1947249] {CVE-2021-29154}
- mm: vmalloc: add cond_resched() in __vunmap() (Rafael Aquini) [1896794]
- mm/vmalloc: __vmalloc_area_node(): avoid 32-bit overflow (Rafael Aquini) [1896794]
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
bpftool
3.10.0-1160.41.1.el7
kernel
3.10.0-1160.41.1.el7
kernel-abi-whitelists
3.10.0-1160.41.1.el7
kernel-debug
3.10.0-1160.41.1.el7
kernel-debug-devel
3.10.0-1160.41.1.el7
kernel-devel
3.10.0-1160.41.1.el7
kernel-doc
3.10.0-1160.41.1.el7
kernel-headers
3.10.0-1160.41.1.el7
kernel-tools
3.10.0-1160.41.1.el7
kernel-tools-libs
3.10.0-1160.41.1.el7
kernel-tools-libs-devel
3.10.0-1160.41.1.el7
perf
3.10.0-1160.41.1.el7
python-perf
3.10.0-1160.41.1.el7
Ссылки на источники
Связанные уязвимости
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
An issue was discovered in the Linux kernel before 5.11.11. The netfil ...