ELSA-2021-9172

ELSA-2021-9172 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2021-04-12

Description


[4.14.35-2047.502.4]
- Revert 'rds: ib: Remove two ib_modify_qp() calls' (Sharath Srinivasan) [Orabug: 32715567]
- uek-rpm: Update SecureBoot Digicert 2021 certificates (Somasundaram Krishnasamy) [Orabug: 32532514]

[4.14.35-2047.502.3]
- video: hyperv_fb: Fix the mmap() regression for v5.4.y and older (Dexuan Cui) [Orabug: 32620797]
- video: hyperv_fb: Fix the cache type when mapping the VRAM (Dexuan Cui) [Orabug: 32620797]
- RDMA/core: Fix corrupted SL on passive side (Hakon Bugge) [Orabug: 32644356]

[4.14.35-2047.502.2]
- EDAC: skx_common: downgrade message importance on missing PCI device (Aristeu Rozanski) [Orabug: 32651294]
- Xen/gnttab: handle p2m update errors on a per-slot basis (Jan Beulich) [Orabug: 32651477] {CVE-2021-28038}
- KVM: kvmclock: Fix vCPUs > 64 can't be online/hotpluged (Wanpeng Li) [Orabug: 32633928]
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (Juergen Gross) [Orabug: 32640132]

[4.14.35-2047.502.1]
- mm/vmscan: fix infinite loop in drop_slab_node (Chunxin Zang) [Orabug: 32619973]
- scsi: iscsi: Verify lengths on passthrough PDUs (Chris Leech) [Orabug: 32603381] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE (Chris Leech) [Orabug: 32603381] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- scsi: iscsi: Report connection state in sysfs (Gabriel Krisman Bertazi) [Orabug: 32603381] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output (Joe Perches) [Orabug: 32603381] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- scsi: iscsi: Restrict sessions and handles to admin capabilities (Lee Duncan) [Orabug: 32603381] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}
- uek-rpm: add opbmc to nano-kernel (Eric Snowberg) [Orabug: 32555678]
- ovl: restore creds in all return paths of ovl_iterate (Somasundaram Krishnasamy) [Orabug: 32608965]

[4.14.35-2047.502.0]
- rds: rds_drop_egress events should be enabled as part of RDS_RTD_SND (Alan Maguire) [Orabug: 32586918]
- rds: use dedicated rds_send_lock_contention tracepoint instead of drop (Alan Maguire) [Orabug: 32586918]
- rds: ensure saddr/daddr for tracepoints is not NULL (Alan Maguire) [Orabug: 32580944]
- hsr: use netdev_err() instead of WARN_ONCE() (Taehee Yoo) [Orabug: 32576073]
- vhost: do not try to access device IOTLB when not initialized (Jason Wang) [Orabug: 31906788]
- uek-rpm: config-aarch-embedded2 update for Feb 2021 Elba patches (Dave Kleikamp) [Orabug: 32544715]
- huge page support for device memory (Neel Patel) [Orabug: 32544715]
- mmc: sdhci-cadence-elba.c: Remove SDHCI_QUIRK_BROKEN_TIMEOUT_VAL (David Clear) [Orabug: 32544715]
- KVM: nVMX: use correct clean fields when copying from eVMCS (Vitaly Kuznetsov) [Orabug: 32544092]
- net/mlx4_en: Handle TX error CQE (Moshe Shemesh) [Orabug: 32492971]
- net/mlx4_en: Avoid scheduling restart task if it is already running (Moshe Shemesh) [Orabug: 32492971]
- PCI: hotplug: Add module parameter to allow user control of LEDs (James Puthukattukaran) [Orabug: 32527186]
- net/rds: Reject error code change (Ka-Cheong Poon) [Orabug: 32565543]
- rds: ib: Remove two ib_modify_qp() calls (Hakon Bugge) [Orabug: 32519917]
- arm64: kexec: add support for kexec with spin-table (Henry Willard) [Orabug: 32546040]
- x86/kvm/hyper-v: move VMX controls sanitization out of nested_enable_evmcs() (Vitaly Kuznetsov) [Orabug: 32543800]
- x86/kvm/hyper-v: remove stale evmcs_already_enabled check from nested_enable_evmcs() (Vitaly Kuznetsov) [Orabug: 32543800]
- net/rds: Need to check shutdown progress in rds_conn_path_destroy() (Ka-Cheong Poon) [Orabug: 32536002]
- A/A Bonding: In rdmaip synchronize access to ip_config[].rdmaip_dev (Sharath Srinivasan) [Orabug: 32050122]
- net/rds: In rds_send_xmit() use sg_next() to get the next sg entry (Sharath Srinivasan) [Orabug: 32125836]
- net/rds: increase 1MB MR pool size for RDS (Manjunath Patil) [Orabug: 32551377]


Related CVEs


CVE-2021-27365
CVE-2021-27363
CVE-2021-28038
CVE-2021-27364

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-2047.502.4.el7uek.src.rpm4362056a7647deb75f634c519602a946eb85485bcd18ff1d8834308369622d7dELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-2047.502.4.el7uek.src.rpm4362056a7647deb75f634c519602a946eb85485bcd18ff1d8834308369622d7dELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-4.14.35-2047.502.4.el7uek.aarch64.rpm0edcb753be08faeac86700474d43d8afe4c6cff734d3267e057a8992f6413193ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-2047.502.4.el7uek.aarch64.rpm0edcb753be08faeac86700474d43d8afe4c6cff734d3267e057a8992f6413193ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-debug-4.14.35-2047.502.4.el7uek.aarch64.rpm3df90d6645e0dc885f9042bbea0581632dbf5d9c6a4cc849260f45f88f764bf5ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-4.14.35-2047.502.4.el7uek.aarch64.rpm3df90d6645e0dc885f9042bbea0581632dbf5d9c6a4cc849260f45f88f764bf5ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-debug-devel-4.14.35-2047.502.4.el7uek.aarch64.rpmbdb712ae8462917e22cf6a10865648ac0646b94fad95c5fe87b881a657c836f5ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-devel-4.14.35-2047.502.4.el7uek.aarch64.rpmbdb712ae8462917e22cf6a10865648ac0646b94fad95c5fe87b881a657c836f5ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-devel-4.14.35-2047.502.4.el7uek.aarch64.rpm696613d88bc11caf3ae0565fc31fee78c98a49b131f0d437073071e1f8c7b376ELSA-2025-20190ol7_aarch64_latest
kernel-uek-devel-4.14.35-2047.502.4.el7uek.aarch64.rpm696613d88bc11caf3ae0565fc31fee78c98a49b131f0d437073071e1f8c7b376ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-headers-4.14.35-2047.502.4.el7uek.aarch64.rpm8c880f382f815c8f50a0e5a65ca9562ce267ff44f8f7dc8d178811a56ab41f5aELBA-2025-20014ol7_aarch64_latest
kernel-uek-headers-4.14.35-2047.502.4.el7uek.aarch64.rpm8c880f382f815c8f50a0e5a65ca9562ce267ff44f8f7dc8d178811a56ab41f5aELBA-2025-20014ol7_aarch64_u9_patch
kernel-uek-tools-4.14.35-2047.502.4.el7uek.aarch64.rpm5f3c01b94e0b03ff9b92e4153f5b141ed781f33d79ec31363aad09b59c5aa538ELSA-2025-20190ol7_aarch64_latest
kernel-uek-tools-4.14.35-2047.502.4.el7uek.aarch64.rpm5f3c01b94e0b03ff9b92e4153f5b141ed781f33d79ec31363aad09b59c5aa538ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-tools-libs-4.14.35-2047.502.4.el7uek.aarch64.rpm42d7cda9eb0fb2ca7dac8c2caf9e923f92237c45dc3f08d69f3615c4219c5f56ELSA-2025-20019ol7_aarch64_latest
kernel-uek-tools-libs-4.14.35-2047.502.4.el7uek.aarch64.rpm42d7cda9eb0fb2ca7dac8c2caf9e923f92237c45dc3f08d69f3615c4219c5f56ELSA-2025-20019ol7_aarch64_u9_patch
kernel-uek-tools-libs-devel-4.14.35-2047.502.4.el7uek.aarch64.rpm05966991c882c587a58325903782ae503eadf48247c558f68b58274b7033e771ELBA-2025-20014ol7_aarch64_latest
kernel-uek-tools-libs-devel-4.14.35-2047.502.4.el7uek.aarch64.rpm05966991c882c587a58325903782ae503eadf48247c558f68b58274b7033e771ELBA-2025-20014ol7_aarch64_u9_patch
perf-4.14.35-2047.502.4.el7uek.aarch64.rpm9a1c72d1ccf0d295a21d425e0de9c72d9f3621d7db9c9869cf0de2a275c0983cELSA-2025-20019ol7_aarch64_latest
perf-4.14.35-2047.502.4.el7uek.aarch64.rpm9a1c72d1ccf0d295a21d425e0de9c72d9f3621d7db9c9869cf0de2a275c0983cELSA-2025-20019ol7_aarch64_u9_patch
python-perf-4.14.35-2047.502.4.el7uek.aarch64.rpmaf206a41b64bbe55b4d64f0e0a9dc95cd37bf070bf1b28503ee34929d6c1ec25ELSA-2025-20019ol7_aarch64_latest
python-perf-4.14.35-2047.502.4.el7uek.aarch64.rpmaf206a41b64bbe55b4d64f0e0a9dc95cd37bf070bf1b28503ee34929d6c1ec25ELSA-2025-20019ol7_aarch64_u9_patch
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-2047.502.4.el7uek.src.rpm4362056a7647deb75f634c519602a946eb85485bcd18ff1d8834308369622d7dELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-4.14.35-2047.502.4.el7uek.x86_64.rpmb8a5cf94c719175fbbff8bd2e502523818095cbc65f270e18b8e48009a716676ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-debug-4.14.35-2047.502.4.el7uek.x86_64.rpmf73d4589a2db572c18809707deaa8021002bbaaf155e8bb515ba9c2f5fa3ecadELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-debug-devel-4.14.35-2047.502.4.el7uek.x86_64.rpmb369f2d580f3c72eec022efdbee18279205e3ac125eafbb265e35db48395ccaeELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-devel-4.14.35-2047.502.4.el7uek.x86_64.rpm9b5d9e43cef20ed9575bb27fa72876b761743c131409e74e2cfa969ac31205e5ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-doc-4.14.35-2047.502.4.el7uek.noarch.rpmda9c83ee7e35479d00490f98e382692b2b254dba9cf512f38279bc94294f27f4ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-tools-4.14.35-2047.502.4.el7uek.x86_64.rpm6927c04ff8d5daf3220a6b65d26d19052323aa5dbcbae7e4622bab5a5085a6d9ELSA-2025-20190ol7_x86_64_UEKR5



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete