Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:2168

Опубликовано: 01 июн. 2021
Источник: rocky
Оценка: Important

Описание

Important: kernel security and bug fix update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: userspace applications can misuse the KVM API to cause a write of 16 bytes at an offset up to 32 GB from vcpu->run (CVE-2021-3501)

  • kernel: nitro_enclaves stale file descriptors on failed usercopy (CVE-2021-3543)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • OVS mistakenly using local IP as tun_dst for VXLAN packets (?) (BZ#1944667)

  • Selinux: The task calling security_set_bools() deadlocks with itself when it later calls selinux_audit_rule_match(). (BZ#1945123)

  • [mlx5] tc flower mpls match options does not work (BZ#1952061)

  • mlx5: missing patches for ct.rel (BZ#1952062)

  • CT HWOL: with OVN/OVS, intermittently, load balancer hairpin TCP packets get dropped for seconds in a row (BZ#1952065)

  • [Lenovo 8.3 bug] Blackscreen after clicking on "Settings" icon from top-right corner. (BZ#1952900)

  • Rocky Linux 8.x missing uio upstream fix. (BZ#1952952)

  • Turbostat doesn't show any measured data on AMD Milan (BZ#1952987)

  • P620 no sound from front headset jack (BZ#1954545)

  • Rocky Linux kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps. (BZ#1955188)

  • [net/sched] connection failed with DNAT + SNAT by tc action ct (BZ#1956458)

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
kernel-docnoarch305.3.1.el8_4kernel-doc-4.18.0-305.3.1.el8_4.noarch.rpm
perfx86_64305.3.1.el8_4perf-4.18.0-305.3.1.el8_4.x86_64.rpm
kernel-modulesx86_64305.3.1.el8_4kernel-modules-4.18.0-305.3.1.el8_4.x86_64.rpm
kernel-corex86_64305.3.1.el8_4kernel-core-4.18.0-305.3.1.el8_4.x86_64.rpm
kernel-cross-headersx86_64305.3.1.el8_4kernel-cross-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
kernel-debug-modulesx86_64305.3.1.el8_4kernel-debug-modules-4.18.0-305.3.1.el8_4.x86_64.rpm
bpftoolx86_64305.3.1.el8_4bpftool-4.18.0-305.3.1.el8_4.x86_64.rpm
kernel-debug-modules-extrax86_64305.3.1.el8_4kernel-debug-modules-extra-4.18.0-305.3.1.el8_4.x86_64.rpm
kernel-modules-extrax86_64305.3.1.el8_4kernel-modules-extra-4.18.0-305.3.1.el8_4.x86_64.rpm
kernel-headersx86_64305.3.1.el8_4kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
больше 4 лет назад

ELSA-2021-2168: kernel security and bug fix update (IMPORTANT)

CVSS3: 6.7
ubuntu
больше 4 лет назад

A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.

CVSS3: 6.7
redhat
больше 4 лет назад

A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.

CVSS3: 6.7
nvd
больше 4 лет назад

A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.

CVSS3: 6.7
debian
больше 4 лет назад

A flaw null pointer dereference in the Nitro Enclaves kernel driver wa ...