[ELSA-2021-9460] Unbreakable Enterprise kernel security update
[4.14.35-2047.507.7.5]
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (Tetsuo Handa) [Orabug: 33369947] {CVE-2021-3573}
- Bluetooth: use correct lock to prevent UAF of hdev object (Lin Ma) [Orabug: 33369947]
- Bluetooth: fix the erroneous flush_work() order (Lin Ma) [Orabug: 33369947] {CVE-2021-3564}
- ext4: fix race writing to an inline_data file while its xattrs are changing (Theodore Ts'o) [Orabug: 33369956] {CVE-2021-40490}
- fuse: fix bad inode (Miklos Szeredi) [Orabug: 33369955] {CVE-2020-36322}
- tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop. (Haoran Luo) [Orabug: 33369954] {CVE-2021-3679}
- virtio_console: Assure used length from device is limited (Xie Yongji) [Orabug: 33369953] {CVE-2021-38160}
- sctp: validate from_addr_param return (Marcelo Ricardo Leitner) [Orabug: 33369952] {CVE-2021-3655}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/perf?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-tools?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-tools-libs?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-tools-libs-devel?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | < 4.14.35-2047.507.7.5.el7uek |
- ID
- ELSA-2021-9460
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2021-9460.html
- Published
-
2021-09-22T00:00:00
(3 years ago) - Modified
-
2021-09-22T00:00:00
(3 years ago) - Rights
- Copyright 2021 Oracle, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1571
- ALAS2-2021-1685
- ALAS2-2021-1696
- ALAS2-2021-1704
- ALAS2-2021-1712
- ALAS2-2022-1761
- ALSA-2021:1578
- ALSA-2021:4356
- ASA-202107-48
- ASA-202107-49
- ASB-A-197154735
- DSA-4978-1
- DSA-5096-1
- ELSA-2021-1578
- ELSA-2021-4356
- ELSA-2021-9404
- ELSA-2021-9406
- ELSA-2021-9450
- ELSA-2021-9451
- ELSA-2021-9458
- ELSA-2021-9459
- ELSA-2021-9474
- ELSA-2021-9475
- ELSA-2021-9485
- ELSA-2021-9488
- ELSA-2021-9534
- ELSA-2022-0063
- ELSA-2022-0620
- ELSA-2022-9348
- FEDORA-2021-4ca1b080bb
- FEDORA-2021-60f1d2eba1
- FEDORA-2021-bc2a819bc5
- FEDORA-2021-db2bb87f35
- MS:CVE-2021-3564
- MS:CVE-2021-40490
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:1142-1
- openSUSE-SU-2021:1271-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:2305-1
- openSUSE-SU-2021:2352-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2022:0366-1
- RHSA-2021:1578
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2022:0063
- RHSA-2022:0065
- RHSA-2022:0620
- RHSA-2022:0622
- RLSA-2021:4356
- SSA:2021-202-01
- SSA:2022-031-01
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1572-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1595-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1605-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1715-1
- SUSE-SU-2021:1724-1
- SUSE-SU-2021:1728-1
- SUSE-SU-2021:1733-1
- SUSE-SU-2021:1865-1
- SUSE-SU-2021:1870-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2305-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2352-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:3177-1
- SUSE-SU-2021:3178-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3207-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3360-1
- SUSE-SU-2021:3361-1
- SUSE-SU-2021:3371-1
- SUSE-SU-2021:3374-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3401-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3440-1
- SUSE-SU-2021:3443-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3459-1
- SUSE-SU-2021:3640-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3658-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3754-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0555-1
- USN-5015-1
- USN-5044-1
- USN-5045-1
- USN-5046-1
- USN-5050-1
- USN-5073-1
- USN-5073-2
- USN-5073-3
- USN-5091-1
- USN-5091-2
- USN-5092-1
- USN-5092-2
- USN-5094-1
- USN-5094-2
- USN-5096-1
- USN-5106-1
- USN-5113-1
- USN-5114-1
- USN-5115-1
- USN-5116-1
- USN-5116-2
- USN-5120-1
- USN-5136-1
- USN-5139-1
- USN-5161-1
- USN-5162-1
- USN-5163-1
- USN-5299-1
- USN-5343-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2021-9460 | https://linux.oracle.com/errata/ELSA-2021-9460.html | |
CVE | CVE-2020-36322 | https://linux.oracle.com/cve/CVE-2020-36322.html | |
CVE | CVE-2021-3573 | https://linux.oracle.com/cve/CVE-2021-3573.html | |
CVE | CVE-2021-3679 | https://linux.oracle.com/cve/CVE-2021-3679.html | |
CVE | CVE-2021-38160 | https://linux.oracle.com/cve/CVE-2021-38160.html | |
CVE | CVE-2021-3655 | https://linux.oracle.com/cve/CVE-2021-3655.html | |
CVE | CVE-2021-40490 | https://linux.oracle.com/cve/CVE-2021-40490.html | |
CVE | CVE-2021-3564 | https://linux.oracle.com/cve/CVE-2021-3564.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-7 | oraclelinux | python-perf | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-7 | oraclelinux | perf | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools-libs?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools-libs | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools-libs-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools-libs-devel | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-7 | oraclelinux | kernel-uek-headers | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.14.35-2047.507.7.5.el7uek | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |