ELSA-2021-9215

ELSA-2021-9215 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2021-05-06

Description


[4.1.12-124.50.2]
- btrfs: fix race when cloning extent buffer during rewind of an old root (Filipe Manana) [Orabug: 32669454] {CVE-2021-28964}
- xen-blkback: don't leak persistent grants from xen_blkbk_map() (Jan Beulich) [Orabug: 32697855] {CVE-2021-28688}
- netfilter: x_tables: Use correct memory barriers. (Mark Tomlinson) [Orabug: 32709125] {CVE-2021-29650}
- netfilter: x_tables: make xt_replace_table wait until old rules are not used anymore (Florian Westphal) [Orabug: 32709125] {CVE-2021-29650}
- do_epoll_ctl(): clean the failure exits up a bit (Al Viro) [Orabug: 32759496] {CVE-2020-0466}
- epoll: Keep a reference on files added to the check list (Marc Zyngier) [Orabug: 32759496] {CVE-2020-0466}
- HID: core: Sanitize event code and type when mapping input (Marc Zyngier) [Orabug: 32759553] {CVE-2020-0465}

[4.1.12-124.50.1]
- floppy: fix lock_fdc() signal handling (Jiri Kosina) [Orabug: 32624116] {CVE-2021-20261}
- Xen/gnttab: handle p2m update errors on a per-slot basis (Jan Beulich) [Orabug: 32651478] {CVE-2021-28038}
- n_tty: Fix stall at n_tty_receive_char_special(). (Tetsuo Handa) [Orabug: 32656942] {CVE-2021-20219}
- fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (Eddy Wu) [Orabug: 32695783] {CVE-2020-35508}
- Return EBUSY from BLKRRPART for mounted whole-dev fs (Eric Sandeen) [Orabug: 32696741]
- SecureBoot Digicert 2021 certificates update (Brian Maly) [Orabug: 32734505]


Related CVEs


CVE-2020-0465
CVE-2020-0466
CVE-2021-29650
CVE-2021-28964
CVE-2021-20261
CVE-2021-28688
CVE-2021-28038
CVE-2021-20219
CVE-2020-35508

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.50.2.el6uek.src.rpm9fc768db2dc94916b016d0a0aa72c7a679876b08b0fdc812d370aa8056ac9a27ELSA-2025-20007ol6_x86_64_UEKR4_ELS
kernel-uek-4.1.12-124.50.2.el6uek.x86_64.rpm7caff6ad52841c8b56318788174360e8c7bcd3dbb265e9c260841017fbfb66ceELSA-2025-20007ol6_x86_64_UEKR4_ELS
kernel-uek-debug-4.1.12-124.50.2.el6uek.x86_64.rpm2d23faa617cab1f241325e909ba0856ba654c4950f38fff4450111a9848bc6a9ELSA-2025-20007ol6_x86_64_UEKR4_ELS
kernel-uek-debug-devel-4.1.12-124.50.2.el6uek.x86_64.rpm1aa8a0bc4273a459f95557b3ddb840e34313c43b27e403f53e365a49c94a2ff2ELSA-2025-20007ol6_x86_64_UEKR4_ELS
kernel-uek-devel-4.1.12-124.50.2.el6uek.x86_64.rpmaffd56288712a138ac10630761ae269ef363564cffbbc76a49f384b0d0ff0b1bELSA-2025-20007ol6_x86_64_UEKR4_ELS
kernel-uek-doc-4.1.12-124.50.2.el6uek.noarch.rpmc0451531d9a2d9d17528ef3d193eb626da1c5d3ebaa757a29210f5018dd760ffELSA-2025-20007ol6_x86_64_UEKR4_ELS
kernel-uek-firmware-4.1.12-124.50.2.el6uek.noarch.rpm57e4dce1c683b13d13f0bcb096ac283be72d69280abd24513afcb91f821a2df0ELSA-2025-20007ol6_x86_64_UEKR4_ELS
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.50.2.el7uek.src.rpm036a5c58128a556c047ea113729bedd2e1511950df53047c25f01bc04d5e9ba1ELSA-2025-20190ol7_x86_64_UEKR4
kernel-uek-4.1.12-124.50.2.el7uek.x86_64.rpme731529b006b5f8098956198a215caae9e23f91e4257499423c0356f5562cc5eELSA-2025-20190ol7_x86_64_UEKR4
kernel-uek-debug-4.1.12-124.50.2.el7uek.x86_64.rpm6cdfc8200cd73e0e89d3db8e2df97bc8584d7d1feb70981da37023a9e8c3a179ELSA-2025-20190ol7_x86_64_UEKR4
kernel-uek-debug-devel-4.1.12-124.50.2.el7uek.x86_64.rpm1e5065d79345472857140d45c158ef2e396b1e224f4be74b7f5ef915ecf06f54ELSA-2025-20190ol7_x86_64_UEKR4
kernel-uek-devel-4.1.12-124.50.2.el7uek.x86_64.rpm5804623f8fad13e3f853ee105c7d09c2ec7e00f3163521e6c5aec233430358f0ELSA-2025-20190ol7_x86_64_UEKR4
kernel-uek-doc-4.1.12-124.50.2.el7uek.noarch.rpm40dd45ffb8e0ad851dfd296ca48c46e3691f8649c740c41adfaab06bed990010ELSA-2025-20190ol7_x86_64_UEKR4
kernel-uek-firmware-4.1.12-124.50.2.el7uek.noarch.rpm49b283cb0da076da048672a45ee930b72114b2a1a1c78be3dfc3e824f13dcad9ELSA-2025-20007ol7_x86_64_UEKR4



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete