ELSA-2021-9005

ELSA-2021-9005 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2021-01-12

Description


[4.14.35-2025.404.1.1]
- target: fix XCOPY NAA identifier lookup (David Disseldorp) [Orabug: 32248040] {CVE-2020-28374}

[4.14.35-2025.404.1]
- xenbus/xenbus_backend: Disallow pending watch messages (SeongJae Park) [Orabug: 32253412] {CVE-2020-29568}
- xen/xenbus: Count pending messages for each watch (SeongJae Park) [Orabug: 32253412] {CVE-2020-29568}
- xen/xenbus/xen_bus_type: Support will_handle watch callback (SeongJae Park) [Orabug: 32253412] {CVE-2020-29568}
- xen/xenbus: Add 'will_handle' callback support in xenbus_watch_path() (SeongJae Park) [Orabug: 32253412] {CVE-2020-29568}
- xen/xenbus: Allow watches discard events before queueing (SeongJae Park) [Orabug: 32253412] {CVE-2020-29568}
- xen-blkback: set ring->xenblkd to NULL after kthread_stop() (Pawel Wieczorkiewicz) [Orabug: 32260256] {CVE-2020-29569}

[4.14.35-2025.404.0]
- vhost scsi: Add support for LUN resets. (Mike Christie) [Orabug: 32201584]
- vhost/scsi: Use copy_to_iter() to send control queue response (Bijan Mottahedeh) [Orabug: 32201584]
- vhost scsi: add lun parser helper (Mike Christie) [Orabug: 32201584]
- scsi: sd: Allow user to configure command retries (Mike Christie) [Orabug: 32201584]
- scsi: core: Add limitless cmd retry support (Mike Christie) [Orabug: 32201584]

[4.14.35-2025.403.5]
- dm crypt: Allow unaligned bio buffer lengths for skcipher devices (Sudhakar Panneerselvam) [Orabug: 32210463]
- mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked() (Andrea Arcangeli) [Orabug: 32212583] {CVE-2020-29368}
- perf/core: Fix race in the perf_mmap_close() function (Jiri Olsa) [Orabug: 32233358] {CVE-2020-14351}

[4.14.35-2025.403.4]
- icmp: randomize the global rate limiter (Eric Dumazet) [Orabug: 32227961] {CVE-2020-25705}
- ocfs2: initialize ip_next_orphan (Wengang Wang) [Orabug: 32159055]
- hv_netvsc: make recording RSS hash depend on feature flag (Stephen Hemminger) [Orabug: 32159975]
- hv_netvsc: record hardware hash in skb (Stephen Hemminger) [Orabug: 32159975]
- Fonts: Support FONT_EXTRA_WORDS macros for built-in fonts (Peilin Ye) [Orabug: 32176263] {CVE-2020-28915}
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (Peilin Ye) [Orabug: 32176263] {CVE-2020-28915}
- block: Fix use-after-free in blkdev_get() (Jason Yan) [Orabug: 32194608] {CVE-2020-15436}
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (Yang Yingliang) [Orabug: 32194712] {CVE-2020-15437}
- staging: rts5208: rename SG_END macro (Arnd Bergmann) [Orabug: 32218496]
- misc: rtsx: rename SG_END macro (Arnd Bergmann) [Orabug: 32218496]


Related CVEs


CVE-2020-29568
CVE-2020-29569
CVE-2020-28374

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-2025.404.1.1.el7uek.src.rpmf9acfa9d4a20823b618ecd751bf28ffbELSA-2021-9220
kernel-uek-4.14.35-2025.404.1.1.el7uek.aarch64.rpma92b687c80d9723db7874299d355d202ELSA-2021-9220
kernel-uek-debug-4.14.35-2025.404.1.1.el7uek.aarch64.rpmd7c36143ec4e4f365cffd4dea809a08cELSA-2021-9220
kernel-uek-debug-devel-4.14.35-2025.404.1.1.el7uek.aarch64.rpm9d6da3669506f7325abb529f5ebf6d82ELSA-2021-9220
kernel-uek-devel-4.14.35-2025.404.1.1.el7uek.aarch64.rpm855b9c84ffc7d805d741771267a0e2acELSA-2021-9220
kernel-uek-headers-4.14.35-2025.404.1.1.el7uek.aarch64.rpm132a012c5cd58a233df1ddc0f7817f50ELSA-2021-9222
kernel-uek-tools-4.14.35-2025.404.1.1.el7uek.aarch64.rpm3d92770d3398b04fc3353f23ec9900b8ELSA-2021-9220
kernel-uek-tools-libs-4.14.35-2025.404.1.1.el7uek.aarch64.rpm80db3abc541615c63e4c5d5b96c9f20dELSA-2021-9220
kernel-uek-tools-libs-devel-4.14.35-2025.404.1.1.el7uek.aarch64.rpm4259f31812cfdafcc08127d23389bf5eELSA-2021-9222
perf-4.14.35-2025.404.1.1.el7uek.aarch64.rpm49905725d5a989a99e8e71fae60585e0ELSA-2021-9220
python-perf-4.14.35-2025.404.1.1.el7uek.aarch64.rpma26e355b2769f18863b537ea6161656cELSA-2021-9220
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-2025.404.1.1.el7uek.src.rpmf9acfa9d4a20823b618ecd751bf28ffbELSA-2021-9220
kernel-uek-4.14.35-2025.404.1.1.el7uek.x86_64.rpm3791e6d2c63ad45b0f23ddaf619fb482ELSA-2021-9220
kernel-uek-debug-4.14.35-2025.404.1.1.el7uek.x86_64.rpm3f16ed5421e04df993cabdb0c8e96ac2ELSA-2021-9220
kernel-uek-debug-devel-4.14.35-2025.404.1.1.el7uek.x86_64.rpm19dc1ca7123bb148a737402ec26ee138ELSA-2021-9220
kernel-uek-devel-4.14.35-2025.404.1.1.el7uek.x86_64.rpmbe0b6aca84edd452739cbc3ca7037c61ELSA-2021-9220
kernel-uek-doc-4.14.35-2025.404.1.1.el7uek.noarch.rpmf5d297a2b2ca987a9af797eb5a93321cELSA-2021-9220
kernel-uek-tools-4.14.35-2025.404.1.1.el7uek.x86_64.rpmcf0ee3de671bd4160ec98cb589cc532bELSA-2021-9220



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete