ELSA-2021-9114

ELSA-2021-9114 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2021-03-17

Description


[5.4.17-2036.104.5]
- scsi: iscsi: Verify lengths on passthrough PDUs (Chris Leech) [Orabug: 32603379] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE (Chris Leech) [Orabug: 32603379] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- scsi: iscsi: Report connection state in sysfs (Gabriel Krisman Bertazi) [Orabug: 32603379] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output (Joe Perches) [Orabug: 32603379] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- scsi: iscsi: Restrict sessions and handles to admin capabilities (Lee Duncan) [Orabug: 32603379] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}


Related CVEs


CVE-2021-27363
CVE-2021-27364
CVE-2021-27365

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2036.104.5.el7uek.src.rpm9d7b940c13882df27eb3156691e1d9bfELSA-2021-9220
kernel-uek-5.4.17-2036.104.5.el7uek.aarch64.rpm6f505b88d57f899fa5d67b8ec46332f4ELSA-2021-9220
kernel-uek-debug-5.4.17-2036.104.5.el7uek.aarch64.rpm3a8c46a5bdee989b2a385cde03647d52ELSA-2021-9220
kernel-uek-debug-devel-5.4.17-2036.104.5.el7uek.aarch64.rpm1c4fe997c1188cd76438169fd944878aELSA-2021-9220
kernel-uek-devel-5.4.17-2036.104.5.el7uek.aarch64.rpm1e20d209dfe5cf3f7c566a24d331d412ELSA-2021-9220
kernel-uek-doc-5.4.17-2036.104.5.el7uek.noarch.rpm92ac2671f09fea6d0aed3c7d4b032ee9ELSA-2021-9220
kernel-uek-tools-5.4.17-2036.104.5.el7uek.aarch64.rpmfd096585fc49b636e143f245fb98bc06ELSA-2021-9220
kernel-uek-tools-libs-5.4.17-2036.104.5.el7uek.aarch64.rpmbe74029b22ffce390fb0e6e946bc1b44ELSA-2021-9220
perf-5.4.17-2036.104.5.el7uek.aarch64.rpm046382e264ac451ac8b24de3f378b21cELSA-2021-9220
python-perf-5.4.17-2036.104.5.el7uek.aarch64.rpm97238c7bbebc1cdae65cab9044298fc2ELSA-2021-9220
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2036.104.5.el7uek.src.rpm9d7b940c13882df27eb3156691e1d9bfELSA-2021-9220
kernel-uek-5.4.17-2036.104.5.el7uek.x86_64.rpm8a8aea06142ea420c3177d612e27877bELSA-2021-9220
kernel-uek-debug-5.4.17-2036.104.5.el7uek.x86_64.rpmeaab775ffe420208a18c85f6dc24db37ELSA-2021-9220
kernel-uek-debug-devel-5.4.17-2036.104.5.el7uek.x86_64.rpm2e48265658e727a21c697ed72b5a3a0fELSA-2021-9220
kernel-uek-devel-5.4.17-2036.104.5.el7uek.x86_64.rpmd0b885befd9d7e0cbaa3643da8532d25ELSA-2021-9220
kernel-uek-doc-5.4.17-2036.104.5.el7uek.noarch.rpm92ac2671f09fea6d0aed3c7d4b032ee9ELSA-2021-9220
kernel-uek-tools-5.4.17-2036.104.5.el7uek.x86_64.rpmb70a93bf1867b945ec0564e1c0457a4aELSA-2021-9220
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2036.104.5.el8uek.src.rpm1fa6e6bbc0371d26113e421c318ae5ca-
kernel-uek-5.4.17-2036.104.5.el8uek.aarch64.rpm1d6e4dee6bf6e844c221948f917935ab-
kernel-uek-debug-5.4.17-2036.104.5.el8uek.aarch64.rpm31a7e8e31d6785df26f83aba68d5e1b0-
kernel-uek-debug-devel-5.4.17-2036.104.5.el8uek.aarch64.rpm4b631410d4cf76f6f2dc79c0d6f4b98d-
kernel-uek-devel-5.4.17-2036.104.5.el8uek.aarch64.rpm3125f3da0e3054976b825cff0e9a28ad-
kernel-uek-doc-5.4.17-2036.104.5.el8uek.noarch.rpmdf8250cbd0c866c18f6a07187e298821-
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2036.104.5.el8uek.src.rpm1fa6e6bbc0371d26113e421c318ae5ca-
kernel-uek-5.4.17-2036.104.5.el8uek.x86_64.rpm1316b8f4cd271674e19c1ff591e65cae-
kernel-uek-debug-5.4.17-2036.104.5.el8uek.x86_64.rpm8a25fa3e5f21754c9f123ae55a576215-
kernel-uek-debug-devel-5.4.17-2036.104.5.el8uek.x86_64.rpm08c565f595d63970e4076ad71de97f59-
kernel-uek-devel-5.4.17-2036.104.5.el8uek.x86_64.rpmf5a603e2d2371f6b6fb2e2788d4f0311-
kernel-uek-doc-5.4.17-2036.104.5.el8uek.noarch.rpmdf8250cbd0c866c18f6a07187e298821-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete