ELSA-2020-2430

ELSA-2020-2430 - kernel security and bug fix update

Type:SECURITY
Severity:MODERATE
Release Date:2020-06-10

Description


[2.6.32-754.30.2.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.30.2]
- x86/speculation: Provide SRBDS late microcode loading support (Waiman Long)
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827185] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827185] {CVE-2020-0543}

[2.6.32-754.30.1]
- [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827226] {CVE-2020-10711}
- [netdrv] bonding: don't set slave->link in bond_update_speed_duplex() (Patrick Talbert) [1828604]
- [security] KEYS: prevent KEYCTL_READ on negative key (Patrick Talbert) [1498368] {CVE-2017-12192}


Related CVEs


CVE-2017-12192

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-754.30.2.el6.src.rpm1a4376a8d79a68c729582b06a06f8d6aELSA-2021-9212
kernel-2.6.32-754.30.2.el6.i686.rpm028119b3f346a1b5c0f0e932bf7d5859ELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.30.2.el6.noarch.rpm3502cee2f4a61f742b0992a125edbb80ELSA-2021-9212
kernel-debug-2.6.32-754.30.2.el6.i686.rpm9dbdd21a3c7f10ace46451d411466c41ELSA-2021-9212
kernel-debug-devel-2.6.32-754.30.2.el6.i686.rpm217a37f2d90b4ee9e4955f6b131ae6c3ELSA-2021-9212
kernel-devel-2.6.32-754.30.2.el6.i686.rpm0402162259fbadc4d86bf0bf5eeaa17fELSA-2021-9212
kernel-doc-2.6.32-754.30.2.el6.noarch.rpmee9d09656c1337dfbd56d6c147d0c0d1ELSA-2021-9212
kernel-firmware-2.6.32-754.30.2.el6.noarch.rpm52ac5f771ba6818af03b0f8eded3d9caELSA-2021-9212
kernel-headers-2.6.32-754.30.2.el6.i686.rpm7e196112161a68b675212ca11982fb22ELSA-2021-9212
perf-2.6.32-754.30.2.el6.i686.rpm05e0701b9eac77990d748e44b184f190ELSA-2021-9212
python-perf-2.6.32-754.30.2.el6.i686.rpmce9414d8afda40dad48bb391530bf94fELSA-2021-9212
Oracle Linux 6 (x86_64) kernel-2.6.32-754.30.2.el6.src.rpm1a4376a8d79a68c729582b06a06f8d6aELSA-2021-9212
kernel-2.6.32-754.30.2.el6.x86_64.rpme4cde28462ff034bf8133cbc50ba105fELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.30.2.el6.noarch.rpm3502cee2f4a61f742b0992a125edbb80ELSA-2021-9212
kernel-debug-2.6.32-754.30.2.el6.x86_64.rpm62bf06f98a20a276df9d723987642182ELSA-2021-9212
kernel-debug-devel-2.6.32-754.30.2.el6.i686.rpm217a37f2d90b4ee9e4955f6b131ae6c3ELSA-2021-9212
kernel-debug-devel-2.6.32-754.30.2.el6.x86_64.rpm980a379a2ad2714c68ee6b20da10a25dELSA-2021-9212
kernel-devel-2.6.32-754.30.2.el6.x86_64.rpm4e62c4a742b72dc6f198e6f2a14cb32aELSA-2021-9212
kernel-doc-2.6.32-754.30.2.el6.noarch.rpmee9d09656c1337dfbd56d6c147d0c0d1ELSA-2021-9212
kernel-firmware-2.6.32-754.30.2.el6.noarch.rpm52ac5f771ba6818af03b0f8eded3d9caELSA-2021-9212
kernel-headers-2.6.32-754.30.2.el6.x86_64.rpmd1099a6007862648877e89af16228c6dELSA-2021-9212
perf-2.6.32-754.30.2.el6.x86_64.rpm187189a54ac1c2ad7369e8971969916bELSA-2021-9212
python-perf-2.6.32-754.30.2.el6.x86_64.rpm925df2e2091427f63f1311a8eff6788eELSA-2021-9212



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete