Описание
ELSA-2021-3438: kernel security and bug fix update (MODERATE)
[3.10.0-1160.42.2.OL7]
- Update Oracle Linux certificates (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-2.0.9
- Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)
[3.10.0-1160.42.2]
- net_sched: cls_route: remove the right filter from hashtable (Ivan Vecera) [1992926]
[3.10.0-1160.42.1]
- [s390] s390/dasd: fix list corruption of lcu list (Claudio Imbrenda) [1889418]
- [s390] s390/dasd: fix list corruption of pavgroup group list (Claudio Imbrenda) [1889418]
- [s390] s390/dasd: prevent inconsistent LCU device data (Claudio Imbrenda) [1889418]
- [s390] s390/dasd: fix hanging device offline processing (Claudio Imbrenda) [1889418]
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
bpftool
3.10.0-1160.42.2.el7
kernel
3.10.0-1160.42.2.el7
kernel-abi-whitelists
3.10.0-1160.42.2.el7
kernel-debug
3.10.0-1160.42.2.el7
kernel-debug-devel
3.10.0-1160.42.2.el7
kernel-devel
3.10.0-1160.42.2.el7
kernel-doc
3.10.0-1160.42.2.el7
kernel-headers
3.10.0-1160.42.2.el7
kernel-tools
3.10.0-1160.42.2.el7
kernel-tools-libs
3.10.0-1160.42.2.el7
kernel-tools-libs-devel
3.10.0-1160.42.2.el7
perf
3.10.0-1160.42.2.el7
python-perf
3.10.0-1160.42.2.el7
Связанные CVE
Связанные уязвимости
A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw was found in the "Routing decision" classifier in the Linux ker ...
A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.