[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2021-9141 -- Oracle kernel-uek-container

ID: oval:org.secpod.oval:def:1504807Date: (C)2021-04-01   (M)2024-04-17
Class: PATCHFamily: unix




[5.4.17-2102.200.13.el7] - bpf, selftests: Fix up some test_verifier cases for unprivileged [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171} - bpf: Add sanity check for upper ptr_limit [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171} - bpf: Simplify alu_limit masking for pointer arithmetic [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171} - bpf: Fix off-by-one for area size in creating mask to left [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171} - bpf: Prohibit alu ops for pointer types not defining ptr_limit [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171} - selftests/bpf: Test access to bpf map pointer [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171} - bpf: Fix truncation handling for mod32 dst reg wrt zero [Orabug: 32673813] {CVE-2021-3444} - bpf: Fix 32 bit src register truncation on div/mod [Orabug: 32673813] {CVE-2021-3444} [5.4.17-2102.200.12.el7] - Revert "x86/platform/uv: Update UV MMRs for UV5" [Orabug: 32651197] - Revert "x86/platform/uv: Add UV5 direct references" [Orabug: 32651197] - Revert "x86/platform/uv: Add and decode Arch Type in UVsystab" [Orabug: 32651197] - Revert "x86/platform/uv: Update MMIOH references based on new UV5 MMRs" [Orabug: 32651197] - Revert "x86/platform/uv: Adjust GAM MMR references affected by UV5 updates" [Orabug: 32651197] - Revert "x86/platform/uv: Update UV5 MMR references in UV GRU" [Orabug: 32651197] - Revert "x86/platform/uv: Update node present counting" [Orabug: 32651197] - Revert "x86/platform/uv: Update UV5 TSC checking" [Orabug: 32651197] - Revert "x86/platform/uv: Update for UV5 NMI MMR changes" [Orabug: 32651197] - Revert "x86/platform/uv: Update Copyrights to conform to HPE standards" [Orabug: 32651197] - Revert "x86/platform/uv: Fix missing OEM_TABLE_ID" [Orabug: 32651197] - Revert "x86/platform/uv: Remove spaces from OEM IDs" [Orabug: 32651197] - Revert "x86/platform/uv: Recognize UV5 hubless system identifier" [Orabug: 32651197] - Revert "x86/tlb/uv: Add a forward declaration for struct flush_tlb_info" [Orabug: 32651197] - Revert "x86/platform/uv: Drop last traces of uv_flush_tlb_others" [Orabug: 32651197] - Revert "x86/platform/uv: Fix copied UV5 output archtype" [Orabug: 32651197] - Revert "x86/platform/uv: Fix UV4 hub revision adjustment" [Orabug: 32651197] [5.4.17-2102.200.11.el7] - mm/vmscan: fix infinite loop in drop_slab_node [Orabug: 32620155] - scsi: iscsi: Verify lengths on passthrough PDUs [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365} - scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365} - scsi: iscsi: Report connection state in sysfs [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365} - sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365} - scsi: iscsi: Restrict sessions and handles to admin capabilities [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365} - drm/nouveau: bail out of nouveau_channel_new if channel init fails [Orabug: 32591559] {CVE-2020-25639} - mm: support memblock alloc on the exact node for sparse_buffer_init [Orabug: 32613823] - mm/sparse.c: do not waste pre allocated memmap space [Orabug: 32613823] - mm/sparse: consistently do not zero memmap [Orabug: 32613823] [5.4.17-2102.200.10.el7] - scsi: target: core: Make completion affinity configurable [4.14.14-2.el7] - BUILDINFO: commit=6bb6e206facd0c0277275ac8b9e82737380c9040 - Bump release to 4.14.14-2.

Platform:
Oracle Linux 8
Oracle Linux 7
Product:
kernel-uek-container
Reference:
ELSA-2021-9141
CVE-2021-27363
CVE-2021-27364
CVE-2021-27365
CVE-2020-25639
CVE-2020-27170
CVE-2020-27171
CVE-2020-28588
CVE-2021-3444
CVE    8
CVE-2020-28588
CVE-2021-27363
CVE-2021-27364
CVE-2021-27365
...

© SecPod Technologies