Описание
ELSA-2024-5259: kernel security update (IMPORTANT)
[3.10.0-1160.119.1.0.3.el7.OL7]
- net: fix __dst_negative_advice() race (Eric Dumazet) [Orabug: 36947298]
[3.10.0-1160.119.1.0.2.el7.OL7]
- md/raid5: fix oops during stripe resizing (Ritika Srivastava) [Orabug: 34048726]
- blk-mq: Remove generation seqeunce (Ritika Srivastava) [Orabug: 33964689]
- block: init flush rq ref count to 1 (Ritika Srivastava) [Orabug: 33964689]
- block: fix null pointer dereference in blk_mq_rq_timed_out() (Ritika Srivastava) [Orabug: 33964689]
- [xen/netfront] stop tx queues during live migration (Orabug: 33446314)
- [xen/balloon] Support xend-based toolstack (Orabug: 28663970)
- [x86/apic/x2apic] avoid allocate multiple irq vectors for a single interrupt on multiple cpu, otherwise irq vectors would be used up when there are only 2 cpu online per node. [Orabug: 28691156]
- [bonding] avoid repeated display of same link status change. [Orabug: 28109857]
- [ipc] ipc/sem.c: bugfix for semctl(,,GETZCNT) (Manfred Spraul) [Orabug: 22552377]
- kexec: Increase KEXEC_AUTO_RESERVED_SIZE to 256M [Orabug: 31517048]
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
bpftool
3.10.0-1160.119.1.0.3.el7
kernel
3.10.0-1160.119.1.0.3.el7
kernel-abi-whitelists
3.10.0-1160.119.1.0.3.el7
kernel-debug
3.10.0-1160.119.1.0.3.el7
kernel-debug-devel
3.10.0-1160.119.1.0.3.el7
kernel-devel
3.10.0-1160.119.1.0.3.el7
kernel-doc
3.10.0-1160.119.1.0.3.el7
kernel-headers
3.10.0-1160.119.1.0.3.el7
kernel-tools
3.10.0-1160.119.1.0.3.el7
kernel-tools-libs
3.10.0-1160.119.1.0.3.el7
kernel-tools-libs-devel
3.10.0-1160.119.1.0.3.el7
perf
3.10.0-1160.119.1.0.3.el7
python-perf
3.10.0-1160.119.1.0.3.el7
Связанные CVE
Связанные уязвимости
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesy ...