[ELSA-2021-9346] Unbreakable Enterprise kernel security update
[4.1.12-124.52.4]
- IB/core: Only update PKEY and GID caches on respective events (Hakon Bugge) [Orabug: 32816368]
- Revert 'Allow mce to reset instead of panic on UE' (William Roche) [Orabug: 32820278]
- Bluetooth: verify AMP hci_chan before amp_destroy (Archie Pusaka) [Orabug: 32912103] {CVE-2021-33034}
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (Peilin Ye) [Orabug: 33013890] {CVE-2020-36386}
- qla2xxx: update version to 9.00.00.00.42.0-k1-v5 (Quinn Tran) [Orabug: 33015884]
- scsi: qla2xxx: v2: Fix login retry count (Quinn Tran) [Orabug: 29411891] [Orabug: 33015884]
- scsi: qla2xxx: Properly extract ADISC error codes (Quinn Tran) [Orabug: 33015884]
- scsi: qla2xxx: Replace GPDB with async ADISC command (Quinn Tran) [Orabug: 33015884]
- qla2xxx: update version to 9.00.00.00.42.0-k1-v4 (Quinn Tran) [Orabug: 33015884]
- qla2xxx: fix relogin stalled. (Quinn Tran) [Orabug: 27700529] [Orabug: 33015884]
- net/mlx4: Treat VFs fair when handling comm_channel_events (Hans Westgaard Ry) [Orabug: 33017263]
[4.1.12-124.52.3]
- iommu/vt-d: Don't dereference iommu_device if IOMMU_API is not built (Bartosz Golaszewski) [Orabug: 32974492]
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (David Woodhouse) [Orabug: 32974492]
- secureboot: make sure kernel-signing.cer is copied to kernel-keys dir (Brian Maly) [Orabug: 32978042]
[4.1.12-124.52.2]
- Bluetooth: A2MP: Fix not initializing all members (Luiz Augusto von Dentz) [Orabug: 32021289] {CVE-2020-12352}
- RDS tcp loopback connection can hang (Rao Shoaib) [Orabug: 32926868]
[4.1.12-124.52.1]
- dm ioctl: fix out of bounds array access when no devices (Mikulas Patocka) [Orabug: 32860494] {CVE-2021-31916}
- ID
- ELSA-2021-9346
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2021-9346.html
- Published
-
2021-07-02T00:00:00
(3 years ago) - Modified
-
2021-07-02T00:00:00
(3 years ago) - Rights
- Copyright 2021 Oracle, Inc.
- Other Advisories
-
- ALAS-2020-1446
- ALAS-2021-1503
- ALAS2-2020-1556
- ALAS2-2021-1685
- ALSA-2021:2570
- ALSA-2021:4356
- ASA-202010-2
- ASA-202010-3
- ASA-202010-4
- ASA-202010-9
- DSA-4774-1
- ELSA-2020-4276
- ELSA-2020-4286
- ELSA-2020-5995
- ELSA-2020-5996
- ELSA-2021-2570
- ELSA-2021-2725
- ELSA-2021-4356
- ELSA-2021-9305
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2021-9308
- ELSA-2021-9349
- ELSA-2021-9351
- ELSA-2021-9362
- ELSA-2021-9363
- FEDORA-2020-ad980d282f
- FEDORA-2020-ce117eff51
- FEDORA-2020-e288acda9a
- FEDORA-2021-bae582b42c
- MS:CVE-2021-31916
- MS:CVE-2021-33034
- openSUSE-SU-2020:1682-1
- openSUSE-SU-2020:1698-1
- openSUSE-SU-2020:2112-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:2184-1
- openSUSE-SU-2021:2202-1
- openSUSE-SU-2021:2427-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2021:3941-1
- RHSA-2020:4276
- RHSA-2020:4280
- RHSA-2020:4286
- RHSA-2020:4289
- RHSA-2021:2563
- RHSA-2021:2570
- RHSA-2021:2599
- RHSA-2021:2725
- RHSA-2021:2726
- RHSA-2021:2727
- RHSA-2021:4140
- RHSA-2021:4356
- RLSA-2021:2570
- SSA:2020-295-01
- SSA:2021-202-01
- SUSE-SU-2020:2972-1
- SUSE-SU-2020:2980-1
- SUSE-SU-2020:2981-1
- SUSE-SU-2020:3281-1
- SUSE-SU-2020:3484-1
- SUSE-SU-2020:3491-1
- SUSE-SU-2020:3501-1
- SUSE-SU-2020:3503-1
- SUSE-SU-2020:3512-1
- SUSE-SU-2020:3513-1
- SUSE-SU-2020:3522-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2025-1
- SUSE-SU-2021:2026-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2042-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2060-1
- SUSE-SU-2021:2067-1
- SUSE-SU-2021:2184-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2202-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2321-1
- SUSE-SU-2021:2324-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2349-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:2643-1
- SUSE-SU-2021:2644-1
- SUSE-SU-2021:2647-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3848-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3877-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3941-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2021:3979-1
- SUSE-SU-2021:3992-1
- USN-4591-1
- USN-4592-1
- USN-4657-1
- USN-4948-1
- USN-4979-1
- USN-4982-1
- USN-4984-1
- USN-4997-1
- USN-4997-2
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5016-1
- USN-5018-1
- USN-5299-1
- USN-5343-1
- USN-5361-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2021-9346 | https://linux.oracle.com/errata/ELSA-2021-9346.html | |
CVE | CVE-2020-12352 | https://linux.oracle.com/cve/CVE-2020-12352.html | |
CVE | CVE-2021-31916 | https://linux.oracle.com/cve/CVE-2021-31916.html | |
CVE | CVE-2021-33034 | https://linux.oracle.com/cve/CVE-2021-33034.html | |
CVE | CVE-2020-36386 | https://linux.oracle.com/cve/CVE-2020-36386.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.52.4.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.52.4.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.52.4.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.52.4.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.52.4.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.52.4.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.52.4.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.52.4.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.52.4.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.52.4.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.52.4.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.52.4.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |