Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-9215

Опубликовано: 06 мая 2021
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2021-9215: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.1.12-124.50.2]

  • btrfs: fix race when cloning extent buffer during rewind of an old root (Filipe Manana) [Orabug: 32669454] {CVE-2021-28964}
  • xen-blkback: don't leak persistent grants from xen_blkbk_map() (Jan Beulich) [Orabug: 32697855] {CVE-2021-28688}
  • netfilter: x_tables: Use correct memory barriers. (Mark Tomlinson) [Orabug: 32709125] {CVE-2021-29650}
  • netfilter: x_tables: make xt_replace_table wait until old rules are not used anymore (Florian Westphal) [Orabug: 32709125] {CVE-2021-29650}
  • do_epoll_ctl(): clean the failure exits up a bit (Al Viro) [Orabug: 32759496] {CVE-2020-0466}
  • epoll: Keep a reference on files added to the check list (Marc Zyngier) [Orabug: 32759496] {CVE-2020-0466}
  • HID: core: Sanitize event code and type when mapping input (Marc Zyngier) [Orabug: 32759553] {CVE-2020-0465}

[4.1.12-124.50.1]

  • floppy: fix lock_fdc() signal handling (Jiri Kosina) [Orabug: 32624116] {CVE-2021-20261}
  • Xen/gnttab: handle p2m update errors on a per-slot basis (Jan Beulich) [Orabug: 32651478] {CVE-2021-28038}
  • n_tty: Fix stall at n_tty_receive_char_special(). (Tetsuo Handa) [Orabug: 32656942] {CVE-2021-20219}
  • fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (Eddy Wu) [Orabug: 32695783] {CVE-2020-35508}
  • Return EBUSY from BLKRRPART for mounted whole-dev fs (Eric Sandeen) [Orabug: 32696741]
  • SecureBoot Digicert 2021 certificates update (Brian Maly) [Orabug: 32734505]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

4.1.12-124.50.2.el6uek

kernel-uek-debug

4.1.12-124.50.2.el6uek

kernel-uek-debug-devel

4.1.12-124.50.2.el6uek

kernel-uek-devel

4.1.12-124.50.2.el6uek

kernel-uek-doc

4.1.12-124.50.2.el6uek

kernel-uek-firmware

4.1.12-124.50.2.el6uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

4.1.12-124.50.2.el7uek

kernel-uek-debug

4.1.12-124.50.2.el7uek

kernel-uek-debug-devel

4.1.12-124.50.2.el7uek

kernel-uek-devel

4.1.12-124.50.2.el7uek

kernel-uek-doc

4.1.12-124.50.2.el7uek

kernel-uek-firmware

4.1.12-124.50.2.el7uek

Связанные уязвимости

suse-cvrf
больше 4 лет назад

Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)

suse-cvrf
больше 4 лет назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP1)

CVSS3: 6.8
ubuntu
больше 4 лет назад

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

CVSS3: 6.6
redhat
больше 4 лет назад

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

CVSS3: 6.8
nvd
больше 4 лет назад

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel