alsa-2021:3447
Vulnerability from osv_almalinux
Published
2021-09-07 17:24
Modified
2021-09-08 10:16
Summary
Important: kernel security and bug fix update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

  • kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c (CVE-2021-38201)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Update Broadcom Emulex lpfc driver for AlmaLinux8.5 with bug fixes (BZ#1948608)

  • cyclictest shows >50us latency when guest enters idle (RT guest with 18 RT vCPUs) (BZ#1981336)

  • xfrm: backports from upstream (BZ#1981840)

  • A task is stuck waiting for the completion of the vmci_resouce releasing upon the balloon reset. (BZ#1982042)

  • [mlx5] backport driver bits of net: zero-initialize tc skb extension on allocation (BZ#1982220)

  • Kernel cannot kill a process doing compaction for hugepage allocation (BZ#1984085)

  • AlmaLinux8.4 Nightly[0108] - [P10] [Regression] Kdump failed on AlmaLinux8.4 on SAN disk via flavafish adapter (qla2xxx/HPT/Radix) (BZ#1986156)

  • [AlmaLinux8.5] scheduler updates and fixes (BZ#1987296)

  • AlmaLinux 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id's over 8 (BZ#1989097)

  • fixes for oopses in security mitigation runtime code patching (BZ#1989174)

  • act mirred doesn't scrub packets when sending them to ingress (BZ#1992226)

  • HPE: Cannot install 8.4 using the DVD presented to the iLO (BZ#1993894)

  • NFS client hangs on share listing when server side readdir verifiers are implemented (BZ#1993895)

  • SNO: The load is extremely high (~870) when pao is added and a profile is applied. (BZ#1994879)

  • timeout value of conntrack entry with TCP ESTABLISHED status is too short (BZ#1995554)

  • Increase the default value for flowtable offload timeouts (BZ#1995555)

  • ice/iavf driver stop responding (BZ#1997534)

  • [FJ8.4 Bug]: [REG] Some files in /proc/sys/user show wrong data (BZ#1998002)


{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-305.17.1.el8_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\n* kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c (CVE-2021-38201)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Update Broadcom Emulex lpfc driver for AlmaLinux8.5 with bug fixes (BZ#1948608)\n\n* cyclictest shows \u003e50us latency when guest enters idle (RT guest with 18 RT vCPUs) (BZ#1981336)\n\n* xfrm: backports from upstream (BZ#1981840)\n\n* A task is stuck waiting for the completion of the vmci_resouce releasing upon the balloon reset. (BZ#1982042)\n\n* [mlx5] backport driver bits of  net: zero-initialize tc skb extension on allocation (BZ#1982220)\n\n* Kernel cannot kill a process doing compaction for hugepage allocation (BZ#1984085)\n\n* AlmaLinux8.4 Nightly[0108] - [P10] [Regression] Kdump failed on AlmaLinux8.4 on SAN disk via flavafish adapter (qla2xxx/HPT/Radix) (BZ#1986156)\n\n* [AlmaLinux8.5] scheduler updates and fixes (BZ#1987296)\n\n* AlmaLinux 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1989097)\n\n* fixes for oopses in security mitigation runtime code patching (BZ#1989174)\n\n* act mirred doesn\u0027t scrub packets when sending them to ingress (BZ#1992226)\n\n* HPE: Cannot install 8.4 using the DVD presented to the iLO (BZ#1993894)\n\n* NFS client hangs on share listing when server side readdir verifiers are implemented (BZ#1993895)\n\n* SNO: The load is extremely high (~870) when pao is added and a profile is applied. (BZ#1994879)\n\n* timeout value of conntrack entry with TCP ESTABLISHED status is too short (BZ#1995554)\n\n* Increase the default value for flowtable offload timeouts (BZ#1995555)\n\n* ice/iavf driver stop responding (BZ#1997534)\n\n* [FJ8.4 Bug]: [REG] Some files in /proc/sys/user show wrong data (BZ#1998002)",
  "id": "ALSA-2021:3447",
  "modified": "2021-09-08T10:16:55Z",
  "published": "2021-09-07T17:24:27Z",
  "references": [
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-37576"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-38201"
    }
  ],
  "related": [
    "CVE-2021-37576",
    "CVE-2021-38201"
  ],
  "summary": "Important: kernel security and bug fix update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…