Описание
ELSA-2025-2501: kernel security update (IMPORTANT)
[3.10.0-1160.119.1.0.7]
- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (Beno_t Sevens) {CVE-2024-53197} [Orabug: 37686305]
- can: bcm: Fix UAF in bcm_proc_show() (YueHaibing) {CVE-2023-52922} [Orabug: 37686305]
- HID: core: zero-initialize the report buffer (Beno_t Sevens) {CVE-2024-50302} [Orabug: 37686305]
[3.10.0-1160.119.1.0.6]
- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (Benoit Sevens) {CVE-2024-53104} [Orabug: 37584712]
[3.10.0-1160.119.1.0.5]
- wifi: mac80211: Avoid address calculations via out of bounds array indexing (Kees Cook) [Orabug: 37092983]
[3.10.0-1160.119.1.0.4]
- fuse: fix pipe buffer lifetime for direct_io (Miklos Szeredi) [Orabug: 36947298]
[3.10.0-1160.119.1.0.3]
- net: fix __dst_negative_advice() race (Eric Dumazet) [Orabug: 36947298]
[3.10.0-1160.119.1.0.2]
- md/raid5: fix oops during stripe resizing (Ritika Srivastava) [Orabug: 34048726]
- blk-mq: Remove generation seqeunce (Ritika Srivastava) [Orabug: 33964689]
- block: init flush rq ref count to 1 (Ritika Srivastava) [Orabug: 33964689]
- block: fix null pointer dereference in blk_mq_rq_timed_out() (Ritika Srivastava) [Orabug: 33964689]
- [xen/netfront] stop tx queues during live migration (Orabug: 33446314)
- [xen/balloon] Support xend-based toolstack (Orabug: 28663970)
- [x86/apic/x2apic] avoid allocate multiple irq vectors for a single interrupt on multiple cpu, otherwise irq vectors would be used up when there are only 2 cpu online per node. [Orabug: 28691156]
- [bonding] avoid repeated display of same link status change. [Orabug: 28109857]
- [ipc] ipc/sem.c: bugfix for semctl(,,GETZCNT) (Manfred Spraul) [Orabug: 22552377]
- kexec: Increase KEXEC_AUTO_RESERVED_SIZE to 256M [Orabug: 31517048]
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
bpftool
3.10.0-1160.119.1.0.7.el7
kernel
3.10.0-1160.119.1.0.7.el7
kernel-abi-whitelists
3.10.0-1160.119.1.0.7.el7
kernel-debug
3.10.0-1160.119.1.0.7.el7
kernel-debug-devel
3.10.0-1160.119.1.0.7.el7
kernel-devel
3.10.0-1160.119.1.0.7.el7
kernel-doc
3.10.0-1160.119.1.0.7.el7
kernel-headers
3.10.0-1160.119.1.0.7.el7
kernel-tools
3.10.0-1160.119.1.0.7.el7
kernel-tools-libs
3.10.0-1160.119.1.0.7.el7
kernel-tools-libs-devel
3.10.0-1160.119.1.0.7.el7
perf
3.10.0-1160.119.1.0.7.el7
python-perf
3.10.0-1160.119.1.0.7.el7
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.