ELSA-2021-9474

ELSA-2021-9474 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2021-10-11

Description


[5.4.17-2102.206.1]
- Revert 'scsi: core: Cap scsi_host cmd_per_lun at can_queue' (Jack Vogel) [Orabug: 33403144]

[5.4.17-2102.206.0]
- Revert 'uek-rpm: Don't recompute build-ids for kernel-uek-debuginfo' (Jack Vogel) [Orabug: 33245043]
- integrity: Load mokx variables into the blacklist keyring (Eric Snowberg) [Orabug: 33418496]
- perf/x86/amd: Don't touch the AMD64_EVENTSEL_HOSTONLY bit inside the guest (Like Xu) [Orabug: 33359395]
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 (Dongli Zhang) [Orabug: 33352679]
- Revert 'uek-rpm: mark /etc/ld.so.conf.d/ files as %config' (aloktiw) [Orabug: 33311489]
- IB/core: Read subnet_prefix in ib_query_port via cache. (Anand Khoje) [Orabug: 33134286]
- IB/core: Shifting initialization of device->cache_lock (Anand Khoje) [Orabug: 33134286]
- IB/core: Updating cache for subnet_prefix in config_non_roce_gid_cache() (Anand Khoje) [Orabug: 33134286]
- IB/core: Shuffle locks in ib_port_data to save memory (Anand Khoje) [Orabug: 33134286]
- IB/core: Removed port validity check from ib_get_cached_subnet_prefix (Anand Khoje) [Orabug: 33134286]
- btrfs: fix NULL pointer dereference when deleting device by invalid id (Qu Wenruo) [Orabug: 33281078] {CVE-2021-3739}
- btrfs: fix race between marking inode needs to be logged and log syncing (Filipe Manana) [Orabug: 33349276]
- net: qrtr: fix another OOB Read in qrtr_endpoint_post (Xiaolong Huang) [Orabug: 33284937] {CVE-2021-3743}
- ext4: fix race writing to an inline_data file while its xattrs are changing (Theodore Ts'o) [Orabug: 33327177] {CVE-2021-40490}
- xfs: remove unused variable (Wengang Wang) [Orabug: 33313442]
- RDMA/cma: Revert INIT-INIT patch (Mike Marciniszyn) [Orabug: 33306518]
- uek-rpm: Don't recompute build-ids for kernel-uek-debuginfo (Somasundaram Krishnasamy) [Orabug: 33245043]
- xen-acpi-processor: fix coordination type mismatch (Elena Ufimtseva)
- KVM: X86: MMU: Use the correct inherited permissions to get shadow page (Lai Jiangshan) [Orabug: 33209458] {CVE-2021-38198}
- usb: hso: fix error handling code of hso_create_net_device (Dongliang Mu) [Orabug: 33174795] {CVE-2021-37159}
- hso: fix bailout in error case of probe (Oliver Neukum) [Orabug: 33174795] {CVE-2021-37159}


Related CVEs


CVE-2021-3743
CVE-2021-40490
CVE-2021-3739
CVE-2021-37159
CVE-2021-38198

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2102.206.1.el7uek.src.rpm00102bea931490a0c6e5025f217a6fa2851d58b0d98e7287fd3837dcf8228355ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-5.4.17-2102.206.1.el7uek.aarch64.rpm9b7f4cbc8245143b2a75a735126c60d9455d32c0ce4e34010e10e4b943ae9f1bELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-debug-5.4.17-2102.206.1.el7uek.aarch64.rpm7a7854e853e0f4ac73f0d22b4f8715c51ffdcb294e8db5b497f8ce9b736ff69fELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-debug-devel-5.4.17-2102.206.1.el7uek.aarch64.rpm673bb86f76cecb443c6324bdcf36b888ee87b12565863bca1f25df34bb8d0e63ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-devel-5.4.17-2102.206.1.el7uek.aarch64.rpmbde6e63f249c1f1eb3ee7e8025ade45e00707b0c510f498ffdfe08bf204af3b3ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-doc-5.4.17-2102.206.1.el7uek.noarch.rpm45efb1499462b6cd03b2a1ccbc19c6fe02d6fb2383994435f68dbd3e1cd0a969ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-tools-5.4.17-2102.206.1.el7uek.aarch64.rpmd493d9b3deec8b0eb310848ca0b6045b636909f809df6ef4a5d02d2c1b931298ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-tools-libs-5.4.17-2102.206.1.el7uek.aarch64.rpm92d79d271ee3160ad56c8ccfff3abf58f2d82080405b92c71190316c2b8ab636ELSA-2025-20019ol7_aarch64_UEKR6
perf-5.4.17-2102.206.1.el7uek.aarch64.rpm6e4b003af357fce7e6681ffe95a94b039573ef7d51328ee41977295862535604ELSA-2025-20019ol7_aarch64_UEKR6
python-perf-5.4.17-2102.206.1.el7uek.aarch64.rpmce85d86302509188e4095b55c5de5d630e178be150434239c3b99d50c3c62387ELSA-2025-20019ol7_aarch64_UEKR6
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2102.206.1.el7uek.src.rpm00102bea931490a0c6e5025f217a6fa2851d58b0d98e7287fd3837dcf8228355ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-5.4.17-2102.206.1.el7uek.x86_64.rpm3b0a8f4424358e277ea172e1396fabdce76d3bf526f45e70f61bd80dfb2bd323ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-debug-5.4.17-2102.206.1.el7uek.x86_64.rpm75e9c459d04513156304a21851e1e5f97c979cfcc441a02e0f184faf96c1a24cELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-debug-devel-5.4.17-2102.206.1.el7uek.x86_64.rpm5ca1c6c04456268c90f6770b523e25f79ce94ddc6e1a9723d4c719e4a4b8e5cdELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-devel-5.4.17-2102.206.1.el7uek.x86_64.rpm082b7d429220625eb50cc65835fbe6ec5454944f00754f6a4cf2dc6388a3ce3aELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-doc-5.4.17-2102.206.1.el7uek.noarch.rpm45efb1499462b6cd03b2a1ccbc19c6fe02d6fb2383994435f68dbd3e1cd0a969ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-tools-5.4.17-2102.206.1.el7uek.x86_64.rpmac8af800e0ab5614298bdf303375d926f39d73f75692e78d9194ba7fe3f88684ELSA-2025-20190ol7_x86_64_UEKR6
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2102.206.1.el8uek.src.rpm624c3c69a719bba11ab1f03641fa0f8a3a73d463f50d527ef23346bc7663f2df-ol8_aarch64_baseos_latest
kernel-uek-5.4.17-2102.206.1.el8uek.src.rpm624c3c69a719bba11ab1f03641fa0f8a3a73d463f50d527ef23346bc7663f2df-ol8_aarch64_u4_baseos_patch
kernel-uek-5.4.17-2102.206.1.el8uek.aarch64.rpma7ce4668c7cb931d02ddbe9c8fa577c3272a8e5458e2a039b82a502c40eb3aa7-ol8_aarch64_baseos_latest
kernel-uek-5.4.17-2102.206.1.el8uek.aarch64.rpma7ce4668c7cb931d02ddbe9c8fa577c3272a8e5458e2a039b82a502c40eb3aa7-ol8_aarch64_u4_baseos_patch
kernel-uek-debug-5.4.17-2102.206.1.el8uek.aarch64.rpm9431f3b7ecedab8a2c9e06375db4ce439fc8d5bfd24993b8a51ea7e200f1ea0b-ol8_aarch64_baseos_latest
kernel-uek-debug-5.4.17-2102.206.1.el8uek.aarch64.rpm9431f3b7ecedab8a2c9e06375db4ce439fc8d5bfd24993b8a51ea7e200f1ea0b-ol8_aarch64_u4_baseos_patch
kernel-uek-debug-devel-5.4.17-2102.206.1.el8uek.aarch64.rpm2742b8117a1d728ffb375bfcab791ee90386b09e270afe9f15c9e51ba239c591-ol8_aarch64_baseos_latest
kernel-uek-debug-devel-5.4.17-2102.206.1.el8uek.aarch64.rpm2742b8117a1d728ffb375bfcab791ee90386b09e270afe9f15c9e51ba239c591-ol8_aarch64_u4_baseos_patch
kernel-uek-devel-5.4.17-2102.206.1.el8uek.aarch64.rpme80e1a8b1c26d77af53b13b15d0e5a5c0fa4b43180a4afedd80401c4eb588778-ol8_aarch64_baseos_latest
kernel-uek-devel-5.4.17-2102.206.1.el8uek.aarch64.rpme80e1a8b1c26d77af53b13b15d0e5a5c0fa4b43180a4afedd80401c4eb588778-ol8_aarch64_u4_baseos_patch
kernel-uek-doc-5.4.17-2102.206.1.el8uek.noarch.rpm3463f862852b350c012e5671c5cc53e4922960a705d3626637c7fd72ea30689e-ol8_aarch64_baseos_latest
kernel-uek-doc-5.4.17-2102.206.1.el8uek.noarch.rpm3463f862852b350c012e5671c5cc53e4922960a705d3626637c7fd72ea30689e-ol8_aarch64_u4_baseos_patch
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2102.206.1.el8uek.src.rpm624c3c69a719bba11ab1f03641fa0f8a3a73d463f50d527ef23346bc7663f2df-ol8_x86_64_UEKR6
kernel-uek-5.4.17-2102.206.1.el8uek.x86_64.rpm1ac610d9fd966dbce47299cccbc9af356f7a7067c8296a944cdddabaec50f06c-ol8_x86_64_UEKR6
kernel-uek-debug-5.4.17-2102.206.1.el8uek.x86_64.rpm7356db0aaa2e0c6f16d1f0d02c6ab3fcc78a5aab73f708ec4a676c20b190a923-ol8_x86_64_UEKR6
kernel-uek-debug-devel-5.4.17-2102.206.1.el8uek.x86_64.rpm9ad9c502c4bc940e09d759889c6f9d54e39f25213ced14dbadbbc5683d69d331-ol8_x86_64_UEKR6
kernel-uek-devel-5.4.17-2102.206.1.el8uek.x86_64.rpme67527feb61a1224ca3c0aa70a2b1cbac7bb91f21ea767640d7aef3fbc7ab039-ol8_x86_64_UEKR6
kernel-uek-doc-5.4.17-2102.206.1.el8uek.noarch.rpm3463f862852b350c012e5671c5cc53e4922960a705d3626637c7fd72ea30689e-ol8_x86_64_UEKR6



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete