kernel-4.18.0-305.25.1.el8_4
エラータID: AXSA:2021-2534:24
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)
* kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c (CVE-2021-0512)
* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [HPE 8.3 bug] No EDAC MC0 message with one-DIMM two-processor configuration under MIRACLE LINUX
* mlx: devlink port function shows all zero hw_addr
* net/sched: act_mirred: allow saving the last chain processed on xmit path
* System hang and / or r/o fs during SVC/v5k/v7k maintenance with ibmvfc
* Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC's - Linux partition suspend timeout (-> documentation/Linux Alert through LTC bug 182549)
* benchTableRepDMLAsyncBarrier regresses by 34% on MIRACLE LINUX on POWER9
* [panic] call trace: ice_probe+0x238/0x10f0 [ice]
* [ice, PTP] ice: fix GPIO 1PPS signal
* Fix locality handling in the tpm_tis driver
* [ice, PTP]: fix Tx queue iteration for Tx timestamp enablement
* PCI passthrough with NVidia GPU "Invalid device 0003:01:00.0 iommu_group file /sys/bus/pci/devices/0003:01:00.0/iommu_group is not a symlink"
* [DELL 8.4 BUG] - System Hangs at Dell Logo When Boot to OS(e1000e with wrong GbE checksum)
* kernel: Fix hanging ioctl caused by wrong msg counter
* kernel: get_timespec64 does not ignore padding in compat syscalls
* [mlx5] eth0: hw csum failure
* xlog_grant_head_wait() does not return and system hangs
* panic while breaking a lease/delegation after user mode helper invocation
* Lockd invalid cast to nlm_lockowner
* [xfstests generic/388] XFS: Assertion failed: 0, file: fs/xfs/xfs_mount.c, line: 1218
Enhancement(s):
* [Intel 8.5 FEAT] ice: Enable PTP Support
* [Intel 8.5 FEAT] ice: Enable GPIO/SDP Support
CVE-2020-36385
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
CVE-2021-0512
In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel
CVE-2021-3656
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Update packages.
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
N/A
SRPMS
- kernel-4.18.0-305.25.1.el8_4.src.rpm
MD5: 0a6d350b3b88c89fa4ccff64a56ed671
SHA-256: 14eb21fce615e5d3e87cede5314d9a4920629c0af05dfa636f330438ea49a5f8
Size: 117.34 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 38a116a548b69620bac5994315656e2f
SHA-256: 802f9508c1bddb5b912fae0147f333c716a39a05e7ec218467cd45d8a202514d
Size: 6.58 MB - kernel-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 21731756234d76e6acbf3032333d4a96
SHA-256: d0e3bc201d694fce15730df60676e70520e0a4ce5411b33c8b31509fbda0d987
Size: 5.90 MB - kernel-abi-stablelists-4.18.0-305.25.1.el8_4.noarch.rpm
MD5: 2e7ea4b32078bfdf24bddc9a224459c2
SHA-256: a176fa53c1405f58cf30ac4cf4ca7f4cb3403a6ab691b51def52cb1cc60fab38
Size: 5.91 MB - kernel-core-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: ae2a9fb851e5340392a3d1977f7671f0
SHA-256: 3e135ff1d66fab73fc060cd5977bbf93472dcf29f514f96c3022ccab5ee929e5
Size: 35.87 MB - kernel-cross-headers-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 2bc4f19369d7c034e98b23b2b619ce8f
SHA-256: 9b8201df873fa807c17f35a4a82742dafc59104a58619d9c097de63c29b208c5
Size: 10.86 MB - kernel-debug-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: de37b3d4fa8c2bb955a46dac888d6f69
SHA-256: 91359fd0db9aa2d8722181cea1b64994a8bb570e43ba5920fbbef39e992c64a9
Size: 5.90 MB - kernel-debug-core-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 053641874e927448a8b122fac14bb457
SHA-256: 5bb79f9caf3ed81bf1872da0d39e1f057c5c15afcf296a765cd9bc6720f3e0c1
Size: 62.90 MB - kernel-debug-devel-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 37272c8aa96c3102c493891e1168f464
SHA-256: 54f6e017c55a37134cc73edcaf91cdd21c7727a5d297de22404da5890fb70711
Size: 18.61 MB - kernel-debug-modules-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: cd221442ff7192fb2557a9482343f26f
SHA-256: 3cb828db4f4d969279e85319b59318ae44438dbcf02c740256bc1d06b5542d8f
Size: 53.58 MB - kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: fc7099d31606e6173cf7bbee28c91fea
SHA-256: e6488db21062d2d4bbb0d2e92c0f2a8f620eeae51277beec7ce8822fab7ec0d3
Size: 7.25 MB - kernel-devel-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: be03bdd6f1cfe1f3637136e5e163a215
SHA-256: 4eca99d27f0fe1865c3cdce0517d026f6f4edf6dcf438f8f3cda7278091ab438
Size: 18.42 MB - kernel-doc-4.18.0-305.25.1.el8_4.noarch.rpm
MD5: a3312b336631443e9fe8bfbd845a8958
SHA-256: 49310d5b14a3c6b2e695eb405979e2c472f215a03f462a1d6fde73b5175db8e9
Size: 22.62 MB - kernel-headers-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 9d2a1d14f57e761587ae412e561f2313
SHA-256: 2eccf57a4406ca27204a2d9292bd376f5089a6bc3733bcd635f0673a00690adf
Size: 7.15 MB - kernel-modules-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 87fabf9bcfa3607c7f90d0cbcc470779
SHA-256: caff3a4ab2258da0608a3f173de3f7b19f154c561ef007459e743fe05daad336
Size: 28.09 MB - kernel-modules-extra-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 77cb81282524ba51eb657d5bf5badc05
SHA-256: c904f5babe97ba6d134c7745ce38478097da36955c44fb20942c742bac593959
Size: 6.57 MB - kernel-tools-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 30a8c61297d2eb0e55e11a30124b4d37
SHA-256: 5e0da93d47984d470e482a41bb4c9e2949799cf5f6da819b6aefb1e4b634d8de
Size: 6.11 MB - kernel-tools-libs-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 6cd7823842ee1465ae51bd093f02c4ad
SHA-256: 04e567a6931a3a7cc3cfed8bba74c3ebc329faabbde9f83704e5654103b43e7c
Size: 5.91 MB - kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: c629cfe1abc627be4c4c2c626cb8f562
SHA-256: 005d54db96a1d1ea7dbd81188f58ce1ee92e08d9cb2002d78e8b4333b2b9c963
Size: 5.90 MB - perf-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: 31a5eec5dc6af067861eb241eb1ad709
SHA-256: 19ba5e65ce4637f59d5a6282cdfee22031cdff1fed884ec4beb9bb311cfa3fa1
Size: 8.12 MB - python3-perf-4.18.0-305.25.1.el8_4.x86_64.rpm
MD5: f6bbd4cf7b7d358d8173263600e8517a
SHA-256: 0f388127ed44cfdf89bf5d219c969b4f96f56845d654ef02f55abdbfb82a36f8
Size: 6.02 MB