ELSA-2021-9053

ELSA-2021-9053 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2021-02-16

Description


[5.4.17-2036.103.3.1uek]
- xen-blkback: fix error handling in xen_blkbk_map() (Jan Beulich) [Orabug: 32492109] {CVE-2021-26930}
- xen-scsiback: don't 'handle' error by BUG() (Jan Beulich) [Orabug: 32492101] {CVE-2021-26931}
- xen-netback: don't 'handle' error by BUG() (Jan Beulich) [Orabug: 32492101] {CVE-2021-26931}
- xen-blkback: don't 'handle' error by BUG() (Jan Beulich) [Orabug: 32492101] {CVE-2021-26931}
- Xen/gntdev: correct error checking in gntdev_map_grant_pages() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}
- Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}
- Xen/x86: also check kernel mapping in set_foreign_p2m_mapping() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}
- Xen/x86: don't bail early from clear_foreign_p2m_mapping() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}


Related CVEs


CVE-2021-26930
CVE-2021-26931
CVE-2021-26932

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2036.103.3.1.el7uek.src.rpmf53f25b4f1570d2012fe3d2d3578d303-
kernel-uek-5.4.17-2036.103.3.1.el7uek.aarch64.rpm7a0069e9f7236524f1d33f4b7beebc37-
kernel-uek-debug-5.4.17-2036.103.3.1.el7uek.aarch64.rpm5ea2abc6a72bc3d285f7d150f51c2093-
kernel-uek-debug-devel-5.4.17-2036.103.3.1.el7uek.aarch64.rpmc55a5e32dddd238a2037e572a9d5461a-
kernel-uek-devel-5.4.17-2036.103.3.1.el7uek.aarch64.rpm128d67b4f05d54048ebaa876e0bba42e-
kernel-uek-doc-5.4.17-2036.103.3.1.el7uek.noarch.rpmfaaf6778fa39c4c5ee1419f691034ed8-
kernel-uek-tools-5.4.17-2036.103.3.1.el7uek.aarch64.rpmc1fae3134433684627366dbdf822716d-
kernel-uek-tools-libs-5.4.17-2036.103.3.1.el7uek.aarch64.rpmc2d33716a43d08c6d9cb9100a179bed0-
perf-5.4.17-2036.103.3.1.el7uek.aarch64.rpmace9d14f864b417a5dd3e6a855210271-
python-perf-5.4.17-2036.103.3.1.el7uek.aarch64.rpmdba7554a9e9746945612fc4cedf6aaba-
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2036.103.3.1.el7uek.src.rpmf53f25b4f1570d2012fe3d2d3578d303-
kernel-uek-5.4.17-2036.103.3.1.el7uek.x86_64.rpmb8ccc9b7efef83e09e8b539a43b3c054-
kernel-uek-debug-5.4.17-2036.103.3.1.el7uek.x86_64.rpm5d244cf3eb5faba866b196906c10cf0c-
kernel-uek-debug-devel-5.4.17-2036.103.3.1.el7uek.x86_64.rpm0cf419c4985281ae6daa257a7984faaa-
kernel-uek-devel-5.4.17-2036.103.3.1.el7uek.x86_64.rpm12c15d3f412770c4725449f808aaa914-
kernel-uek-doc-5.4.17-2036.103.3.1.el7uek.noarch.rpmfaaf6778fa39c4c5ee1419f691034ed8-
kernel-uek-tools-5.4.17-2036.103.3.1.el7uek.x86_64.rpm8dad4ecad1eae933b0b230916c59d34d-
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2036.103.3.1.el8uek.src.rpm0ff70149f174d46170f6cecf28934970-
kernel-uek-5.4.17-2036.103.3.1.el8uek.aarch64.rpm73c91f7be1beaca2cb2ae0f9930c180c-
kernel-uek-debug-5.4.17-2036.103.3.1.el8uek.aarch64.rpm408eb4479d0a8f90691f1036013e3c5c-
kernel-uek-debug-devel-5.4.17-2036.103.3.1.el8uek.aarch64.rpmbfe5b6ea0700e745ff642d201b148aab-
kernel-uek-devel-5.4.17-2036.103.3.1.el8uek.aarch64.rpm1066e6063b23ae225fba8b3a0fed1866-
kernel-uek-doc-5.4.17-2036.103.3.1.el8uek.noarch.rpmc449d67ce454d4a36614c929ba3e7554-
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2036.103.3.1.el8uek.src.rpm0ff70149f174d46170f6cecf28934970-
kernel-uek-5.4.17-2036.103.3.1.el8uek.x86_64.rpme5f4873576240e1c5ca232e2044e41fd-
kernel-uek-debug-5.4.17-2036.103.3.1.el8uek.x86_64.rpm2784ab4fcd752f60d00fc42ae4e17ca5-
kernel-uek-debug-devel-5.4.17-2036.103.3.1.el8uek.x86_64.rpmf7b227fcfdfcc38d0611cb53bbba6747-
kernel-uek-devel-5.4.17-2036.103.3.1.el8uek.x86_64.rpm537d49d694d69589b5fb5c072d43d648-
kernel-uek-doc-5.4.17-2036.103.3.1.el8uek.noarch.rpmc449d67ce454d4a36614c929ba3e7554-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete