<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:"Calibri",sans-serif;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri",sans-serif;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoPlainText">Oracle Linux Security Advisory ELSA-2021-9141<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><a href="http://linux.oracle.com/errata/ELSA-2021-9141.html">http://linux.oracle.com/errata/ELSA-2021-9141.html</a><o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">x86_64:<o:p></o:p></p>
<p class="MsoPlainText">kernel-uek-container-5.4.17-2102.200.13.el7.x86_64.rpm<o:p></o:p></p>
<p class="MsoPlainText">kernel-uek-container-debug-5.4.17-2102.200.13.el7.x86_64.rpm<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">aarch64:<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">SRPMS:<o:p></o:p></p>
<p class="MsoPlainText"><a href="http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-container-5.4.17-2102.200.13.el7.src.rpm">http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-container-5.4.17-2102.200.13.el7.src.rpm</a><o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">Description of changes:<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">[5.4.17-2102.200.13.el7]<o:p></o:p></p>
<p class="MsoPlainText">- bpf, selftests: Fix up some test_verifier cases for unprivileged (Piotr Krysiuk) [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171}<o:p></o:p></p>
<p class="MsoPlainText">- bpf: Add sanity check for upper ptr_limit (Piotr Krysiuk) [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171}<o:p></o:p></p>
<p class="MsoPlainText">- bpf: Simplify alu_limit masking for pointer arithmetic (Piotr Krysiuk) [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171}<o:p></o:p></p>
<p class="MsoPlainText">- bpf: Fix off-by-one for area size in creating mask to left (Piotr Krysiuk) [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171}<o:p></o:p></p>
<p class="MsoPlainText">- bpf: Prohibit alu ops for pointer types not defining ptr_limit (Piotr Krysiuk) [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171}<o:p></o:p></p>
<p class="MsoPlainText">- selftests/bpf: Test access to bpf map pointer (Andrey Ignatov) [Orabug: 32656761] {CVE-2020-27170} {CVE-2020-27171}<o:p></o:p></p>
<p class="MsoPlainText">- bpf: Fix truncation handling for mod32 dst reg wrt zero (Daniel Borkmann) [Orabug: 32673813] {CVE-2021-3444}<o:p></o:p></p>
<p class="MsoPlainText">- bpf: Fix 32 bit src register truncation on div/mod (Daniel Borkmann) [Orabug: 32673813] {CVE-2021-3444}<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">[5.4.17-2102.200.12.el7]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Update UV MMRs for UV5" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Add UV5 direct references" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Add and decode Arch Type in UVsystab" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Update MMIOH references based on new UV5 MMRs" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Adjust GAM MMR references affected by UV5 updates" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Update UV5 MMR references in UV GRU" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Update node present counting" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Update UV5 TSC checking" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Update for UV5 NMI MMR changes" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Update Copyrights to conform to HPE standards" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Fix missing OEM_TABLE_ID" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Remove spaces from OEM IDs" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Recognize UV5 hubless system identifier" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/tlb/uv: Add a forward declaration for struct flush_tlb_info" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Drop last traces of uv_flush_tlb_others" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Fix copied UV5 output archtype" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText">- Revert "x86/platform/uv: Fix UV4 hub revision adjustment" (Jack Vogel) [Orabug: 32651197]<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">[5.4.17-2102.200.11.el7]<o:p></o:p></p>
<p class="MsoPlainText">- mm/vmscan: fix infinite loop in drop_slab_node (Chunxin Zang) [Orabug: 32620155]<o:p></o:p></p>
<p class="MsoPlainText">- scsi: iscsi: Verify lengths on passthrough PDUs (Chris Leech) [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}<o:p></o:p></p>
<p class="MsoPlainText">- scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE (Chris Leech) [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}<o:p></o:p></p>
<p class="MsoPlainText">- scsi: iscsi: Report connection state in sysfs (Gabriel Krisman Bertazi) [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}<o:p></o:p></p>
<p class="MsoPlainText">- sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output (Joe Perches) [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}<o:p></o:p></p>
<p class="MsoPlainText">- scsi: iscsi: Restrict sessions and handles to admin capabilities (Lee Duncan) [Orabug: 32603378] {CVE-2021-27363} {CVE-2021-27364} {CVE-2021-27365}<o:p></o:p></p>
<p class="MsoPlainText">- drm/nouveau: bail out of nouveau_channel_new if channel init fails (Frantisek Hrbata) [Orabug: 32591559] {CVE-2020-25639}<o:p></o:p></p>
<p class="MsoPlainText">- mm: support memblock alloc on the exact node for sparse_buffer_init() (Yunfeng Ye) [Orabug: 32613823]<o:p></o:p></p>
<p class="MsoPlainText">- mm/sparse.c: do not waste pre allocated memmap space (Michal Hocko) [Orabug: 32613823]<o:p></o:p></p>
<p class="MsoPlainText">- mm/sparse: consistently do not zero memmap (Vincent Whitchurch) [Orabug: 32613823]<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">[5.4.17-2102.200.10.el7]<o:p></o:p></p>
<p class="MsoPlainText">- scsi: target: core: Make completion affinity configurable<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText">[4.14.14-2.el7]<o:p></o:p></p>
<p class="MsoPlainText">- BUILDINFO: commit=6bb6e206facd0c0277275ac8b9e82737380c9040<o:p></o:p></p>
<p class="MsoPlainText">- Bump release to 4.14.14-2.<o:p></o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>