ELSA-2021-9434

ELSA-2021-9434 - kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2021-08-30

Description


[2.6.32-754.35.1.0.5.OL6]
- [kernel] futex: Use pi_state_update_owner() in put_pi_state() (Thomas Gleixner) [1922249] {CVE-2021-3347} [Orabug: 33150734]
- [kernel] futex: Handle faults correctly for PI futexes (Thomas Gleixner) [1922249] {CVE-2021-3347} [Orabug: 33150734]
- [kernel] futex: Provide and use pi_state_update_owner() (Thomas Gleixner) [1922249] {CVE-2021-3347}[Orabug: 33150734]
- [kernel] futex: Replace pointless printk in fixup_owner() (Thomas Gleixner) [1922249] {CVE-2021-3347} [Orabug: 33150734]
- [kernel] futex: Ensure the correct return value from futex_lock_pi() (Thomas Gleixner) [1922249] {CVE-2021-3347} [Orabug: 33150734]
- [drm] drm/i915/guc: Disable firmware loading on i915 option (Dave Airlie) [1930246] {CVE-2020-12362} [Orabug: 33150734]


Related CVEs


CVE-2020-12362
CVE-2021-3347

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-754.35.1.0.5.el6.src.rpm7a677b609695f30d65651d1521b8f35a-
kernel-2.6.32-754.35.1.0.5.el6.i686.rpm5ecbc0f613eaf2c1908b5cf71fcd846f-
kernel-abi-whitelists-2.6.32-754.35.1.0.5.el6.noarch.rpmf712a5cb0cb7b98ae40dbfb700cd8908-
kernel-debug-2.6.32-754.35.1.0.5.el6.i686.rpm7bd4d53e04081df892e2737d44fb7894-
kernel-debug-devel-2.6.32-754.35.1.0.5.el6.i686.rpm8c0dec93e4b53d756be8914f87d643f9-
kernel-devel-2.6.32-754.35.1.0.5.el6.i686.rpm6cfc64863b52e722fafbabdab4bd47c9-
kernel-doc-2.6.32-754.35.1.0.5.el6.noarch.rpmfa66e5542955cc6f9f0518e23d9c974b-
kernel-firmware-2.6.32-754.35.1.0.5.el6.noarch.rpm54bf67ce5259c860a9bfb75c395787f4-
kernel-headers-2.6.32-754.35.1.0.5.el6.i686.rpme9b05d344a2a84f36b9ef9df8fb1e019-
perf-2.6.32-754.35.1.0.5.el6.i686.rpmec74c27eaa24eebfaaa0d771e3e5f43c-
python-perf-2.6.32-754.35.1.0.5.el6.i686.rpm650cbdc684f789524546cca231668c71-
Oracle Linux 6 (x86_64) kernel-2.6.32-754.35.1.0.5.el6.src.rpm7a677b609695f30d65651d1521b8f35a-
kernel-2.6.32-754.35.1.0.5.el6.x86_64.rpm996e85cd3a00aafcd66af345de3cbc81-
kernel-abi-whitelists-2.6.32-754.35.1.0.5.el6.noarch.rpmf712a5cb0cb7b98ae40dbfb700cd8908-
kernel-debug-2.6.32-754.35.1.0.5.el6.x86_64.rpm5760bb241c6860d6ebdee74b474cacd9-
kernel-debug-devel-2.6.32-754.35.1.0.5.el6.i686.rpm8c0dec93e4b53d756be8914f87d643f9-
kernel-debug-devel-2.6.32-754.35.1.0.5.el6.x86_64.rpm762d620f9471b9636f06a733b5222c9e-
kernel-devel-2.6.32-754.35.1.0.5.el6.x86_64.rpm8ae22eda4ae8c91f8825149fdc04ee04-
kernel-doc-2.6.32-754.35.1.0.5.el6.noarch.rpmfa66e5542955cc6f9f0518e23d9c974b-
kernel-firmware-2.6.32-754.35.1.0.5.el6.noarch.rpm54bf67ce5259c860a9bfb75c395787f4-
kernel-headers-2.6.32-754.35.1.0.5.el6.x86_64.rpm196f42fe0cbbca8f6816195e7409e154-
perf-2.6.32-754.35.1.0.5.el6.x86_64.rpm777913bf314ea80926704108e92bb7c7-
python-perf-2.6.32-754.35.1.0.5.el6.x86_64.rpmdb08b7af23fda3a7601b4a8682b339c1-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete