[ELSA-2021-9475] Unbreakable Enterprise kernel-container security update
[5.4.17-2102.206.1]
- Revert 'scsi: core: Cap scsi_host cmd_per_lun at can_queue' (Jack Vogel)
[Orabug: 33403144]
[5.4.17-2102.206.0]
- Revert 'uek-rpm: Don't recompute build-ids for kernel-uek-debuginfo' (Jack Vogel) [Orabug: 33245043]
- integrity: Load mokx variables into the blacklist keyring (Eric Snowberg) [Orabug: 33418496]
- perf/x86/amd: Don't touch the AMD64_EVENTSEL_HOSTONLY bit inside the guest (Like Xu) [Orabug: 33359395]
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 (Dongli Zhang) [Orabug: 33352679]
- Revert 'uek-rpm: mark /etc/ld.so.conf.d/ files as %config' (aloktiw) [Orabug: 33311489]
- IB/core: Read subnet_prefix in ib_query_port via cache. (Anand Khoje) [Orabug: 33134286]
- IB/core: Shifting initialization of device->cache_lock (Anand Khoje) [Orabug: 33134286]
- IB/core: Updating cache for subnet_prefix in config_non_roce_gid_cache() (Anand Khoje) [Orabug: 33134286]
- IB/core: Shuffle locks in ib_port_data to save memory (Anand Khoje) [Orabug: 33134286]
- IB/core: Removed port validity check from ib_get_cached_subnet_prefix (Anand Khoje) [Orabug: 33134286]
- btrfs: fix NULL pointer dereference when deleting device by invalid id (Qu Wenruo) [Orabug: 33281078] {CVE-2021-3739}
- btrfs: fix race between marking inode needs to be logged and log syncing (Filipe Manana) [Orabug: 33349276]
- net: qrtr: fix another OOB Read in qrtr_endpoint_post (Xiaolong Huang) [Orabug: 33284937] {CVE-2021-3743}
- ext4: fix race writing to an inline_data file while its xattrs are changing (Theodore Ts'o) [Orabug: 33327177] {CVE-2021-40490}
- xfs: remove unused variable (Wengang Wang) [Orabug: 33313442]
- RDMA/cma: Revert INIT-INIT patch (Mike Marciniszyn) [Orabug: 33306518]
- xen-acpi-processor: fix coordination type mismatch (Elena Ufimtseva) [Orabug: 33296812]
- KVM: X86: MMU: Use the correct inherited permissions to get shadow page (Lai Jiangshan) [Orabug: 33209458] {CVE-2021-38198}
- usb: hso: fix error handling code of hso_create_net_device (Dongliang Mu) [Orabug: 33174795] {CVE-2021-37159}
- hso: fix bailout in error case of probe (Oliver Neukum) [Orabug: 33174795] {CVE-2021-37159}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-8 | < 5.4.17-2102.206.1.el8 |
pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-7 | < 5.4.17-2102.206.1.el7 |
pkg:rpm/oraclelinux/kernel-uek-container-debug?distro=oraclelinux-8 | < 5.4.17-2102.206.1.el8 |
pkg:rpm/oraclelinux/kernel-uek-container-debug?distro=oraclelinux-7 | < 5.4.17-2102.206.1.el7 |
- ID
- ELSA-2021-9475
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2021-9475.html
- Published
-
2021-10-11T00:00:00
(2 years ago) - Modified
-
2021-10-11T00:00:00
(2 years ago) - Rights
- Copyright 2021 Oracle, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS2-2021-1704
- ALAS2-2021-1712
- ALAS2-2021-1719
- ALSA-2022:1988
- DSA-4978-1
- ELSA-2021-9457
- ELSA-2021-9458
- ELSA-2021-9459
- ELSA-2021-9460
- ELSA-2021-9461
- ELSA-2021-9474
- ELSA-2021-9485
- ELSA-2021-9488
- ELSA-2022-1988
- FEDORA-2021-4ca1b080bb
- FEDORA-2021-60f1d2eba1
- MS:CVE-2021-37159
- MS:CVE-2021-3739
- MS:CVE-2021-3743
- MS:CVE-2021-40490
- openSUSE-SU-2021:1271-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2021:3876-1
- RHSA-2022:1975
- RHSA-2022:1988
- RLSA-2022:1988
- SSA:2022-031-01
- SUSE-SU-2021:3073-1
- SUSE-SU-2021:3177-1
- SUSE-SU-2021:3178-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3196-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3207-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3848-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- USN-5070-1
- USN-5092-1
- USN-5092-2
- USN-5096-1
- USN-5113-1
- USN-5114-1
- USN-5115-1
- USN-5116-1
- USN-5116-2
- USN-5117-1
- USN-5120-1
- USN-5136-1
- USN-5137-1
- USN-5137-2
- USN-5163-1
- USN-5164-1
- USN-5343-1
- USN-5361-1
- USN-6971-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2021-9475 | https://linux.oracle.com/errata/ELSA-2021-9475.html | |
CVE | CVE-2021-40490 | https://linux.oracle.com/cve/CVE-2021-40490.html | |
CVE | CVE-2021-3739 | https://linux.oracle.com/cve/CVE-2021-3739.html | |
CVE | CVE-2021-37159 | https://linux.oracle.com/cve/CVE-2021-37159.html | |
CVE | CVE-2021-38198 | https://linux.oracle.com/cve/CVE-2021-38198.html | |
CVE | CVE-2021-3743 | https://linux.oracle.com/cve/CVE-2021-3743.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-8 | oraclelinux | kernel-uek-container | < 5.4.17-2102.206.1.el8 | oraclelinux-8 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-7 | oraclelinux | kernel-uek-container | < 5.4.17-2102.206.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-container-debug?distro=oraclelinux-8 | oraclelinux | kernel-uek-container-debug | < 5.4.17-2102.206.1.el8 | oraclelinux-8 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-container-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-container-debug | < 5.4.17-2102.206.1.el7 | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |