[ELSA-2021-9223] Unbreakable Enterprise kernel-container security update
[4.14.35-2047.503.1.el7]
- bpf, x86: Validate computation of branch displacements for x86-64 (Piotr Krysiuk) [Orabug: 32759961] {CVE-2021-29154}
- uek-rpm: Add Amazon Elastic Network Adapter module to nano rpm. (Somasundaram Krishnasamy) [Orabug: 32781585]
- ext4: handle error of ext4_setup_system_zone() on remount (Jan Kara) [Orabug: 32656590] {CVE-2021-3428}
[4.14.35-2047.503.0.el7]
- tcp: do not mess with cloned skbs in tcp_add_backlog() (Eric Dumazet) [Orabug: 32660047]
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (Suravee Suthikulpanit) [Orabug: 32640437]
- iommu/amd: Increase interrupt remapping table limit to 512 entries (Suravee Suthikulpanit) [Orabug: 32640437]
- rds: ib: move statistics counting from caller to callee in rds_ib_recv_refill (Hakon Bugge) [Orabug: 32702021]
- uek-rpm: Enable IRQ time accounting option for UEK5 (Saeed Mirzamohammadi) [Orabug: 32733985]
- btrfs: fix race when cloning extent buffer during rewind of an old root (Filipe Manana) [Orabug: 32669453] {CVE-2021-28964}
- perf/x86/intel: Fix a crash caused by zero PEBS status (Kan Liang) [Orabug: 32669472] {CVE-2021-28971}
- xen-blkback: don't leak persistent grants from xen_blkbk_map() (Jan Beulich) [Orabug: 32697854] {CVE-2021-28688}
- ocfs2: fix deadlock between setattr and dio_end_io_write (Wengang Wang) [Orabug: 32545320]
- rds: Add code to debug rds_tcp loopback hang (Rao Shoaib) [Orabug: 32422982]
- bpf: Add sanity check for upper ptr_limit (Piotr Krysiuk) [Orabug: 32656764] {CVE-2020-27170} {CVE-2020-27171}
- bpf: Simplify alu_limit masking for pointer arithmetic (Piotr Krysiuk) [Orabug: 32656764] {CVE-2020-27170} {CVE-2020-27171}
- bpf: Prohibit alu ops for pointer types not defining ptr_limit (Piotr Krysiuk) [Orabug: 32656764] {CVE-2020-27170} {CVE-2020-27171}
- netfilter: x_tables: Use correct memory barriers. (Mark Tomlinson) [Orabug: 32709123] {CVE-2021-29650}
- netfilter: x_tables: make xt_replace_table wait until old rules are not used anymore (Florian Westphal) [Orabug: 32709123] {CVE-2021-29650}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-7 | < 4.14.35-2047.503.1.el7 |
- ID
- ELSA-2021-9223
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2021-9223.html
- Published
-
2021-05-10T00:00:00
(3 years ago) - Modified
-
2021-05-10T00:00:00
(3 years ago) - Rights
- Copyright 2021 Oracle, Inc.
- Other Advisories
-
- ALAS-2021-1503
- ALAS-2021-1516
- ALAS2-2021-1627
- ALAS2-2021-1685
- ALSA-2021:4356
- ALSA-2022:1988
- ELSA-2021-2314
- ELSA-2021-3327
- ELSA-2021-4356
- ELSA-2021-9140
- ELSA-2021-9141
- ELSA-2021-9215
- ELSA-2021-9220
- ELSA-2021-9221
- ELSA-2021-9222
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2022-1988
- FEDORA-2021-2306e89112
- FEDORA-2021-41fb54ae9f
- FEDORA-2021-68b0dd2373
- FEDORA-2021-6b0f287b8b
- FEDORA-2021-9503fffad9
- FEDORA-2021-e49da8a226
- FEDORA-2021-e636ce53df
- FEDORA-2021-e71c033f88
- FEDORA-2021-f0181b8085
- MS:CVE-2020-27170
- MS:CVE-2020-27171
- MS:CVE-2021-28964
- MS:CVE-2021-28971
- MS:CVE-2021-29154
- MS:CVE-2021-29650
- openSUSE-SU-2021:0532-1
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:0716-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:0873-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- RHSA-2021:1578
- RHSA-2021:1739
- RHSA-2021:2314
- RHSA-2021:2316
- RHSA-2021:3327
- RHSA-2021:3328
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2022:1975
- RHSA-2022:1988
- RLSA-2022:1988
- SSA:2021-202-01
- SUSE-SU-2021:1175-1
- SUSE-SU-2021:1176-1
- SUSE-SU-2021:1177-1
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1248-1
- SUSE-SU-2021:1266-1
- SUSE-SU-2021:1301-1
- SUSE-SU-2021:1341-1
- SUSE-SU-2021:1344-1
- SUSE-SU-2021:1347-1
- SUSE-SU-2021:1365-1
- SUSE-SU-2021:1373-1
- SUSE-SU-2021:1395-1
- SUSE-SU-2021:1571-1
- SUSE-SU-2021:1572-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1574-1
- SUSE-SU-2021:1595-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1605-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1622-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1715-1
- SUSE-SU-2021:1724-1
- SUSE-SU-2021:1728-1
- SUSE-SU-2021:1865-1
- SUSE-SU-2021:1870-1
- SUSE-SU-2021:1915-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2026-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:2846-1
- SUSE-SU-2021:4052-1
- SUSE-SU-2022:0668-1
- SUSE-SU-2022:1003-1
- SUSE-SU-2022:1641-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2651-1
- USN-4887-1
- USN-4890-1
- USN-4912-1
- USN-4916-1
- USN-4917-1
- USN-4945-1
- USN-4945-2
- USN-4946-1
- USN-4947-1
- USN-4948-1
- USN-4949-1
- USN-4979-1
- USN-4982-1
- USN-4984-1
- USN-5137-1
- USN-5137-2
- USN-5343-1
- USN-5361-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
- XSA-371
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2021-9223 | https://linux.oracle.com/errata/ELSA-2021-9223.html | |
CVE | CVE-2020-27170 | https://linux.oracle.com/cve/CVE-2020-27170.html | |
CVE | CVE-2020-27171 | https://linux.oracle.com/cve/CVE-2020-27171.html | |
CVE | CVE-2021-28688 | https://linux.oracle.com/cve/CVE-2021-28688.html | |
CVE | CVE-2021-28964 | https://linux.oracle.com/cve/CVE-2021-28964.html | |
CVE | CVE-2021-29650 | https://linux.oracle.com/cve/CVE-2021-29650.html | |
CVE | CVE-2021-3428 | https://linux.oracle.com/cve/CVE-2021-3428.html | |
CVE | CVE-2021-28971 | https://linux.oracle.com/cve/CVE-2021-28971.html | |
CVE | CVE-2021-29154 | https://linux.oracle.com/cve/CVE-2021-29154.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-7 | oraclelinux | kernel-uek-container | < 4.14.35-2047.503.1.el7 | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |