RHSA-2021:3327-01 -- Redhat kernel, bpftool, perf, python-perfID: oval:org.secpod.oval:def:506332 | Date: (C)2021-09-03 (M)2024-05-22 |
Class: PATCH | Family: unix |
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: out-of-bounds write in xt_compat_target_from_user in net/netfilter/x_tables.c * kernel: race condition for removal of the HCI controller * kernel: powerpc: RTAS calls can be used to compromise kernel integrity * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation * kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * SAN Switch rebooted and caused OpenStack compute node to reboot * sysfs: cannot create duplicate filename "/class/mdio_bus/ixgbe-8100 * XFS: read-only recovery does not update free space accounting in superblock * The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. * Backport of upstream patch net: Update window_clamp if SOCK_RCVBUF is set into rhel-7 * Kernel panic in init_cq_frag_buf * futex: futex_requeue can potentially free the pi_state structure twice * be_poll lockup doing ifenslave when netconsole using bond * OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info
Platform: |
Red Hat Enterprise Linux 7 |
Product: |
kernel |
bpftool |
perf |
python-perf |