Oracle Linux 6279 Published by

An unbreakable Enterprise kernel security update has been released for Oracle Linux 7.



El-errata: ELSA-2021-9053 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update


Oracle Linux Security Advisory ELSA-2021-9053

  http://linux.oracle.com/errata/ELSA-2021-9053.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
kernel-uek-5.4.17-2036.103.3.1.el7uek.x86_64.rpm
kernel-uek-debug-5.4.17-2036.103.3.1.el7uek.x86_64.rpm
kernel-uek-debug-devel-5.4.17-2036.103.3.1.el7uek.x86_64.rpm
kernel-uek-devel-5.4.17-2036.103.3.1.el7uek.x86_64.rpm
kernel-uek-doc-5.4.17-2036.103.3.1.el7uek.noarch.rpm
kernel-uek-tools-5.4.17-2036.103.3.1.el7uek.x86_64.rpm

aarch64:
kernel-uek-5.4.17-2036.103.3.1.el7uek.aarch64.rpm
kernel-uek-debug-5.4.17-2036.103.3.1.el7uek.aarch64.rpm
kernel-uek-debug-devel-5.4.17-2036.103.3.1.el7uek.aarch64.rpm
kernel-uek-devel-5.4.17-2036.103.3.1.el7uek.aarch64.rpm
kernel-uek-doc-5.4.17-2036.103.3.1.el7uek.noarch.rpm
kernel-uek-tools-5.4.17-2036.103.3.1.el7uek.aarch64.rpm
kernel-uek-tools-libs-5.4.17-2036.103.3.1.el7uek.aarch64.rpm
perf-5.4.17-2036.103.3.1.el7uek.aarch64.rpm
python-perf-5.4.17-2036.103.3.1.el7uek.aarch64.rpm

SRPMS:
  http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-5.4.17-2036.103.3.1.el7uek.src.rpm


Description of changes:

[5.4.17-2036.103.3.1.el7uek]
- xen-blkback: fix error handling in xen_blkbk_map() (Jan Beulich) [Orabug: 32492109] {CVE-2021-26930}
- xen-scsiback: don't "handle" error by BUG() (Jan Beulich) [Orabug: 32492101] {CVE-2021-26931}
- xen-netback: don't "handle" error by BUG() (Jan Beulich) [Orabug: 32492101] {CVE-2021-26931}
- xen-blkback: don't "handle" error by BUG() (Jan Beulich) [Orabug: 32492101] {CVE-2021-26931}
- Xen/gntdev: correct error checking in gntdev_map_grant_pages() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}
- Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}
- Xen/x86: also check kernel mapping in set_foreign_p2m_mapping() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}
- Xen/x86: don't bail early from clear_foreign_p2m_mapping() (Jan Beulich) [Orabug: 32492093] {CVE-2021-26932}