ELSA-2021-3548

ELSA-2021-3548 - kernel security, bug fix, and enhancement update

Type:SECURITY
Severity:MODERATE
Release Date:2021-09-16

Description


[4.18.0-305.19.1_4.OL8]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-11.0.5

[4.18.0-305.19.1_4]
- libceph: allow addrvecs with a single NONE/blank address (Jeff Layton) [1996682 1972278]
- ice: Only lock to update netdev dev_addr (Michal Schmidt) [2000129 1995868]
- ice: don't remove netdev->dev_addr from uc sync list (Ken Cox) [2000130 1961018]

[4.18.0-305.18.1_4]
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (Steve Best) [1989560 1986715]
- lib: devres: add a helper function for ioremap_uc (Steve Best) [1989560 1986715]
- ceph: fix test for whether we can skip read when writing beyond EOF (Jeff Layton) [1996680 1971101]
- arm64: memory: Add missing brackets to untagged_addr() macro (Chris von Recklinghausen) [1997998 1955809]
- arm64: tags: Preserve tags for addresses translated via TTBR1 (Chris von Recklinghausen) [1997998 1955809]
- arm64: entry: Move ct_user_exit before any other exception (Chris von Recklinghausen) [1997998 1955809]
- arm64: memory: Implement __tag_set() as common function (Chris von Recklinghausen) [1997998 1955809]
- arm64: mm: Really fix sparse warning in untagged_addr() (Chris von Recklinghausen) [1997998 1955809]
- arm64: untag user pointers in access_ok and __uaccess_mask_ptr (Chris von Recklinghausen) [1997998 1955809]
- arm64/mm: fix variable 'tag' set but not used (Chris von Recklinghausen) [1997998 1955809]
- arm64: entry: SP Alignment Fault doesn't write to FAR_EL1 (Chris von Recklinghausen) [1997998 1955809]
- arm64: compat: Add separate CP15 trapping hook (Chris von Recklinghausen) [1997998 1955809]
- arm64: don't restore GPRs when context tracking (Chris von Recklinghausen) [1997998 1955809]
- KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656) (Jon Maloy) [1985429 1985430] {CVE-2021-3656}
- KVM: SVM: add module param to control the #SMI interception (Jon Maloy) [1985429 1985430] {CVE-2021-3656}
- tty: Don't hold ldisc lock in tty_reopen() if ldisc present (Waiman Long) [1997999 1968271]
- tty/ldsem: Add lockdep asserts for ldisc_sem (Waiman Long) [1997999 1968271]
- tty: Simplify tty->count math in tty_reopen() (Waiman Long) [1997999 1968271]
- tty: Don't block on IO when ldisc change is pending (Waiman Long) [1997999 1968271]
- tty: Hold tty_ldisc_lock() during tty_reopen() (Waiman Long) [1997999 1968271]
- tty: Drop tty->count on tty_reopen() failure (Waiman Long) [1997999 1968271]
- [s390] s390/vtime: fix increased steal time accounting (Claudio Imbrenda) [1988386 1963075]
- XArray: Fix splitting to non-zero orders (Chris von Recklinghausen) [1997997 1946304]
- XArray: Fix split documentation (Chris von Recklinghausen) [1997997 1946304]
- ima: extend boot_aggregate with kernel measurements (Bruno Meneguele) [1997766 1977422]
- ceph: reduce contention in ceph_check_delayed_caps() (Jeff Layton) [1995862 1953430]
- ice: Stop processing VF messages during teardown (Ken Cox) [1997538 1986451]
- iavf: Set RSS LUT and key in reset handle path (Ken Cox) [1997536 1910853]
- KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653) (Jon Maloy) [1985412 1985413] {CVE-2021-3653}
- scsi: ibmvfc: Fix potential race in ibmvfc_wait_for_ops() (Steve Best) [1969792 1941180]
- [s390] s390/dasd: add missing discipline function (Claudio Imbrenda) [1995206 1981804]
- serial_core: switch to ->[sg]et_serial() (Artem Savkov) [1993872 1952415]
- net/mlx5e: Fix mapping of ct_label zero (Jan Stancek) [1983681 1915308]
- drm/qxl: add lock asserts to qxl_bo_vmap_locked + qxl_bo_vunmap_locked (Lyude Paul) [1992839 1907341]
- drm/qxl: rework cursor plane (Lyude Paul) [1992839 1907341]
- drm/qxl: move shadow handling to new qxl_prepare_shadow() (Lyude Paul) [1992839 1907341]
- drm/qxl: fix monitors object vmap (Lyude Paul) [1992839 1907341]
- drm/qxl: fix prime vmap (Lyude Paul) [1992839 1907341]
- drm/qxl: rename qxl_bo_kmap -> qxl_bo_vmap_locked (Lyude Paul) [1992839 1907341]
- drm/qxl: fix lockdep issue in qxl_alloc_release_reserved (Lyude Paul) [1992839 1907341]
- drm/qxl: use ttm bo priorities (Lyude Paul) [1992839 1907341]
- drm/qxl: more fence wait rework (Lyude Paul) [1992839 1907341]
- drm/qxl: properly handle device init failures (Lyude Paul) [1992839 1907341]
- drm/qxl: allocate dumb buffers in ram (Lyude Paul) [1992839 1907341]
- drm/qxl: simplify qxl_fence_wait (Lyude Paul) [1992839 1907341]
- drm/qxl: properly free qxl releases (Lyude Paul) [1992839 1907341]
- drm/qxl: handle shadow in primary destroy (Lyude Paul) [1992839 1907341]
- drm/qxl: properly pin/unpin shadow (Lyude Paul) [1992839 1907341]
- drm/qxl: release shadow on shutdown (Lyude Paul) [1992839 1907341]
- drm/qxl: unpin release objects (Lyude Paul) [1992839 1907341]
- drm/qxl: use drmm_mode_config_init (Lyude Paul) [1992839 1907341]
- qxl/ttm: drop the unusued no wait flag to reserve function (Lyude Paul) [1992839 1907341]


Related CVEs


CVE-2021-3653

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) kernel-4.18.0-305.19.1.el8_4.src.rpmb003295e9dc17fdd7c165ad84a650c27-
bpftool-4.18.0-305.19.1.el8_4.aarch64.rpmd9df104a04647c204505dec2cc2b945b-
kernel-headers-4.18.0-305.19.1.el8_4.aarch64.rpm3456a630fc23bed5850b1717c693e9aa-
kernel-tools-4.18.0-305.19.1.el8_4.aarch64.rpm930c3940cc21e4480c7cb13e761ca48b-
kernel-tools-libs-4.18.0-305.19.1.el8_4.aarch64.rpm7a6ce9c7c86587f8dde2332aae100fcb-
kernel-tools-libs-devel-4.18.0-305.19.1.el8_4.aarch64.rpm8b0b34a946b8e1166c21929b4d0e2bfc-
perf-4.18.0-305.19.1.el8_4.aarch64.rpm89e86fcb74c3994d1817eb808e57dd6c-
python3-perf-4.18.0-305.19.1.el8_4.aarch64.rpm598808ca8c26ed49858d288c4044ea78-
Oracle Linux 8 (x86_64) kernel-4.18.0-305.19.1.el8_4.src.rpmb003295e9dc17fdd7c165ad84a650c27-
bpftool-4.18.0-305.19.1.el8_4.x86_64.rpm75e7cfb2b9bf20f0fd9520b1aba30112-
kernel-4.18.0-305.19.1.el8_4.x86_64.rpme1b28db3f106ad87cd4e38545dcb59f1-
kernel-abi-stablelists-4.18.0-305.19.1.el8_4.noarch.rpm77b6c21c1d72d36cb0be98913fefd711-
kernel-core-4.18.0-305.19.1.el8_4.x86_64.rpm29e47f2cfe35bf62b15fb22f59727050-
kernel-cross-headers-4.18.0-305.19.1.el8_4.x86_64.rpmc307a0c2c78534b374e1b3827c1c2bd8-
kernel-debug-4.18.0-305.19.1.el8_4.x86_64.rpm11bc74849b42e9d55f5c8a51e60034f4-
kernel-debug-core-4.18.0-305.19.1.el8_4.x86_64.rpmde625de02d0aadfacc7c079bc87e5e60-
kernel-debug-devel-4.18.0-305.19.1.el8_4.x86_64.rpm382f45f3fa2da4ce63ad6b3de4323d7f-
kernel-debug-modules-4.18.0-305.19.1.el8_4.x86_64.rpmc4c3380c46496fae99cf1452701dddc3-
kernel-debug-modules-extra-4.18.0-305.19.1.el8_4.x86_64.rpm7ee5c64f30ab160cf39016769b20d1b6-
kernel-devel-4.18.0-305.19.1.el8_4.x86_64.rpma00a06d2bc11abe890829c492667847c-
kernel-doc-4.18.0-305.19.1.el8_4.noarch.rpmf1996534bcaf4ec3d91decaa3d7ed2ae-
kernel-headers-4.18.0-305.19.1.el8_4.x86_64.rpm53367836c371f4c2e71e6b4d8f566fa9-
kernel-modules-4.18.0-305.19.1.el8_4.x86_64.rpmb2492e440272bf5cbcb39b41d383c78d-
kernel-modules-extra-4.18.0-305.19.1.el8_4.x86_64.rpm4a8757c2313783e9295c3503c689a410-
kernel-tools-4.18.0-305.19.1.el8_4.x86_64.rpm7477dc35ea0ebb5af2379ccff6c1931b-
kernel-tools-libs-4.18.0-305.19.1.el8_4.x86_64.rpm2d798285bdc8cd87acfee3314a2d064c-
kernel-tools-libs-devel-4.18.0-305.19.1.el8_4.x86_64.rpm9637086a5aa570c8e72869cb9b778656-
perf-4.18.0-305.19.1.el8_4.x86_64.rpme022994fff2b4a2483c1467e0b679e41-
python3-perf-4.18.0-305.19.1.el8_4.x86_64.rpm7bac98a4c669c70ec43c12687a4ac21b-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete