kernel-3.10.0-1160.53.1.el7
エラータID: AXSA:2022-2973:02
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* A gfs2 withdrawal occurs function = gfs2_setbit, file = fs/gfs2/rgrp.c, line = 109
* i40e SR-IOV TX driver issue detected on VF 7 - VF connectivity loose after VF down/up
* duplicate ACK not sent when expected
* [kernel-debug] BUG: bad unlock balance detected! when running LTP read_all
* Rudimentary support for AMD Milan - Call init_amd_zn() om Family 19h processors
* A VM with <=8 CPUs handles all the Mellanox NIC interrupts on CPU0 only, causing low performance
* fix _PSD override quirk for AMD family 19h+
* generic_file_aio_read returns 0 when interrupted early with a fatal signal
CVE-2020-25704
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
CVE-2020-36322
An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
CVE-2021-42739
The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.
Update packages.
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.
N/A
SRPMS
- kernel-3.10.0-1160.53.1.el7.src.rpm
MD5: 895ea763ba7461c0b258c2eb31f5770a
SHA-256: 4b28bc1a160a0eb85c129668c4c23f277608a1fad9ede671160d6745e90bdda2
Size: 98.74 MB
Asianux Server 7 for x86_64
- bpftool-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: 4aea691377c8edbbb2c7457208de081b
SHA-256: af52139c61ce8cb2860914c27a600006e0bb6622192606373612238880cfaf06
Size: 8.49 MB - kernel-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: 26760bbb1a2d96c8bdcfa8dd850f7002
SHA-256: 755be38ef28da544d6820098739abdac4a85571a4ffb4155dee0d7a44dcc7575
Size: 50.34 MB - kernel-debug-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: 531ca131b76e3e29a3ecb3211a0276fd
SHA-256: 8fd43c51ca9a810413adab4bcd5d223fff26a6abd60f8f04627e0f0d959069c7
Size: 52.64 MB - kernel-debug-devel-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: a9e0acfb1e6d85e486e7ab5549d24de9
SHA-256: ff8ee0dd165a9098febdc0720a743ca4ddfa7043761f136d1dca43063d678767
Size: 18.05 MB - kernel-devel-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: 82e157594618db9b7bab4155f8db3765
SHA-256: 91afd880127b8bbc67833e3a1a5076fc4da013b4a14a8ea030cb0c9187d79f39
Size: 17.98 MB - kernel-doc-3.10.0-1160.53.1.el7.noarch.rpm
MD5: 011757d75c315063ddd743c976ce1664
SHA-256: ee70a31d4ba2c9b87cd4f9ca7179aa2702147277b5e8855d8ff1a424861bfedb
Size: 19.52 MB - kernel-headers-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: 40569bde96394624aa179a5a3600b37b
SHA-256: dd343c77fd982d03c0a4c7740f44b62444c4cfb63aceb8b6e4e9a15fe1b9fe04
Size: 9.05 MB - kernel-tools-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: 868ef557848492ce02c06e96dac6a3fb
SHA-256: 1b36d50a314f271b26ec09e68d7d45223a6a66e3e36588f8e1ef92eb2548d293
Size: 8.16 MB - kernel-tools-libs-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: ae6952da0feeda0092ce0b2b79bfe3a5
SHA-256: e46d23f4e37d6cd11df1f586b5b4d13f9164c2f83ea1fc286f7477d132f80598
Size: 8.05 MB - perf-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: 4c41646e2b07780035557e8484bad791
SHA-256: 710d90d2a48afa10ebbc3a046d1d4be2cdf34df42542b3dbbcb4dd32514b1fb7
Size: 9.69 MB - python-perf-3.10.0-1160.53.1.el7.x86_64.rpm
MD5: fd5eb440cf08c36c1c285d3bba56fceb
SHA-256: c387dc85332b2583bb4345e39423bab7235e66f295d40ee76ee82b84cc860c86
Size: 8.15 MB