Oracle Linux Security Advisory ELSA-2021-3327

https://linux.oracle.com/errata/ELSA-2021-3327.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm
kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-doc-3.10.0-1160.41.1.el7.noarch.rpm
kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm
perf-3.10.0-1160.41.1.el7.x86_64.rpm
python-perf-3.10.0-1160.41.1.el7.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol7/SRPMS-updates/kernel-3.10.0-1160.41.1.el7.src.rpm

Related CVEs:

CVE-2020-27777
CVE-2021-22555
CVE-2021-29154
CVE-2021-29650
CVE-2021-32399




Description of changes:

[3.10.0-1160.41.1.el7.OL7]
- Update Oracle Linux certificates (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-2.0.9.el7
- Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)

[3.10.0-1160.41.1.el7]
- ixgbe: fix warning: sysfs: cannot create duplicate filename (Daniel Vacek) [1915449]

[3.10.0-1160.40.1.el7]
- redhat: ppc64: CONFIG_RTAS_FILTER (Aristeu Rozanski) [1906443] {CVE-2020-27777}
- powerpc/rtas: Fix typo of ibm,open-errinjct in RTAS filter (Aristeu Rozanski) [1906443] {CVE-2020-27777}
- powerpc/rtas: Restrict RTAS requests from userspace (Aristeu Rozanski) [1906443] {CVE-2020-27777}
- IB/mlx5: Fix initializing CQ fragments buffer (Alaa Hleihel) [1962499]

[3.10.0-1160.39.1.el7]
- netfilter: x_tables: fix compat match/target pad out-of-bound write (Florian Westphal) [1980489] {CVE-2021-22555}
- Revert "be2net: disable bh with spin_lock in be_process_mcc" (Petr Oros) [1971744]
- futex: futex_requeue can potentially free the pi_state structure twice (Donghai Qiao) [1966856]
- xfs: sync lazy sb accounting on quiesce of read-only mounts (Carlos Maiolino) [1921551]
- scsi: lpfc: Fix crash caused by switch reboot (Dick Kennedy) [1897576]

[3.10.0-1160.38.1.el7]
- seq_file: Disallow extremely large seq buffer allocations (Ian Kent) [1975251]
- memcg, slab: Fix incorrect placement of rcu_head in struct memcg_cache_params (Waiman Long) [1951810]
- netfilter: x_tables: Use correct memory barriers. (Phil Sutter) [1949087] {CVE-2021-29650}
- netfilter: nf_nat: don't bug when mapping already exists (Florian Westphal) [1972970]
- netfilter: don't setup nat info for confirmed ct (Florian Westphal) [1972970]

[3.10.0-1160.37.1.el7]
- bluetooth: eliminate the potential race condition when removing the HCI controller (Gopal Tiwari) [1971457]
- net: Update window_clamp if SOCK_RCVBUF is set (Balazs Nemeth) [1962196]
- bpf, x86: Validate computation of branch displacements for x86-64 (Jiri Olsa) [1947249] {CVE-2021-29154}
- mm: vmalloc: add cond_resched() in __vunmap() (Rafael Aquini) [1896794]
- mm/vmalloc: __vmalloc_area_node(): avoid 32-bit overflow (Rafael Aquini) [1896794]


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle7: ELSA-2021-3327: kernel Important Security Update

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Summary

[3.10.0-1160.41.1.el7.OL7] - Update Oracle Linux certificates (Ilya Okomin) - Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com) - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 <= 15-2.0.9.el7 - Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin) [3.10.0-1160.41.1.el7] - ixgbe: fix warning: sysfs: cannot create duplicate filename (Daniel Vacek) [1915449] [3.10.0-1160.40.1.el7] - redhat: ppc64: CONFIG_RTAS_FILTER (Aristeu Rozanski) [1906443] {CVE-2020-27777} - powerpc/rtas: Fix typo of ibm,open-errinjct in RTAS filter (Aristeu Rozanski) [1906443] {CVE-2020-27777} - powerpc/rtas: Restrict RTAS requests from userspace (Aristeu Rozanski) [1906443] {CVE-2020-27777} - IB/mlx5: Fix initializing CQ fragments buffer (Alaa Hleihel) [1962499] [3.10.0-1160.39.1.el7] - netfilter: x_tables: fix compat match/target pad out-of-bound write (Florian Westphal) [1980489] {CVE-2021-22555} - Revert "be2net: disable bh with spin_lock in be_process_mcc" (Petr Oros) [1971744] - futex: futex_requeue can potentially free the pi_state structure twice (Donghai Qiao) [1966856] - xfs: sync lazy sb accounting on quiesce of read-only mounts (Carlos Maiolino) [1921551] - scsi: lpfc: Fix crash caused by switch reboot (Dick Kennedy) [1897576] [3.10.0-1160.38.1.el7] - seq_file: Disallow extremely large seq buffer allocations (Ian Kent) [1975251] - memcg, slab: Fix incorrect placement of rcu_head in struct memcg_cache_params (Waiman Long) [1951810] - netfilter: x_tables: Use correct memory barriers. (Phil Sutter) [1949087] {CVE-2021-29650} - netfilter: nf_nat: don't bug when mapping already exists (Florian Westphal) [1972970] - netfilter: don't setup nat info for confirmed ct (Florian Westphal) [1972970] [3.10.0-1160.37.1.el7] - bluetooth: eliminate the potential race condition when removing the HCI controller (Gopal Tiwari) [1971457] - net: Update window_clamp if SOCK_RCVBUF is set (Balazs Nemeth) [1962196] - bpf, x86: Validate computation of branch displacements for x86-64 (Jiri Olsa) [1947249] {CVE-2021-29154} - mm: vmalloc: add cond_resched() in __vunmap() (Rafael Aquini) [1896794] - mm/vmalloc: __vmalloc_area_node(): avoid 32-bit overflow (Rafael Aquini) [1896794]

SRPMs

https://oss.oracle.com:443/ol7/SRPMS-updates/kernel-3.10.0-1160.41.1.el7.src.rpm

x86_64

bpftool-3.10.0-1160.41.1.el7.x86_64.rpm kernel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-doc-3.10.0-1160.41.1.el7.noarch.rpm kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm perf-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-3.10.0-1160.41.1.el7.x86_64.rpm

aarch64

i386

Severity
Related CVEs: CVE-2020-27777 CVE-2021-22555 CVE-2021-29154 CVE-2021-29650 CVE-2021-32399

Related News