OVMSA-2021-0016 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2021-05-06 |
Description
[4.1.12-124.50.2]
- btrfs: fix race when cloning extent buffer during rewind of an old root (Filipe Manana) [Orabug: 32669454] {CVE-2021-28964}
- xen-blkback: don't leak persistent grants from xen_blkbk_map() (Jan Beulich) [Orabug: 32697855] {CVE-2021-28688}
- netfilter: x_tables: Use correct memory barriers. (Mark Tomlinson) [Orabug: 32709125] {CVE-2021-29650}
- netfilter: x_tables: make xt_replace_table wait until old rules are not used anymore (Florian Westphal) [Orabug: 32709125] {CVE-2021-29650}
- do_epoll_ctl(): clean the failure exits up a bit (Al Viro) [Orabug: 32759496] {CVE-2020-0466}
- epoll: Keep a reference on files added to the check list (Marc Zyngier) [Orabug: 32759496] {CVE-2020-0466}
- HID: core: Sanitize event code and type when mapping input (Marc Zyngier) [Orabug: 32759553] {CVE-2020-0465}
[4.1.12-124.50.1]
- floppy: fix lock_fdc() signal handling (Jiri Kosina) [Orabug: 32624116] {CVE-2021-20261}
- Xen/gnttab: handle p2m update errors on a per-slot basis (Jan Beulich) [Orabug: 32651478] {CVE-2021-28038}
- n_tty: Fix stall at n_tty_receive_char_special(). (Tetsuo Handa) [Orabug: 32656942] {CVE-2021-20219}
- fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (Eddy Wu) [Orabug: 32695783] {CVE-2020-35508}
- Return EBUSY from BLKRRPART for mounted whole-dev fs (Eric Sandeen) [Orabug: 32696741]
- SecureBoot Digicert 2021 certificates update (Brian Maly) [Orabug: 32734505]
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3 (x86_64) | kernel-uek-4.1.12-124.50.2.el6uek.src.rpm | 30267d0b53891d28bbf2ee9996981a50 | - |
| kernel-uek-4.1.12-124.50.2.el6uek.x86_64.rpm | eb85bbf412362dd30042c1206572a1c4 | - |
| kernel-uek-firmware-4.1.12-124.50.2.el6uek.noarch.rpm | fa0dc0d0d098ee5a1c3c9891ed1e8112 | - |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team