ELSA-2020-5526

ELSA-2020-5526 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-01-30

Description


[4.14.35-1902.10.4.el7uek]
- kvm: Don't reference vcpu->arch.st in arch-independent code (Boris Ostrovsky) [Orabug: 30489861]
- kvm: fix compile on s390 part 2 (Christian Borntraeger) [Orabug: 30489861]
- kvm: fix compilation on s390 (Paolo Bonzini) [Orabug: 30489861]
- kvm: fix compilation on aarch64 (Paolo Bonzini) [Orabug: 30489861]

[4.14.35-1902.10.3.el7uek]
- x86/KVM: Clean up host's steal time structure (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/kvm: Cache gfn to pfn translation (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/kvm: Introduce kvm_(un)map_gfn() (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- KVM: Properly check if page is valid in kvm_vcpu_unmap (KarimAllah Ahmed) [Orabug: 30489861]
- KVM: Introduce a new guest mapping API (KarimAllah Ahmed) [Orabug: 30489861]
- KVM: x86: svm: make sure NMI is injected after nmi_singlestep (Vitaly Kuznetsov) [Orabug: 30714532]


Related CVEs


CVE-2019-15917
CVE-2019-3016

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1902.10.4.el7uek.src.rpmab804565e47e3f0ea789f6a9980a830dELSA-2021-9220
kernel-uek-4.14.35-1902.10.4.el7uek.aarch64.rpm2b0764906e8800f9e860b9bbc801b81cELSA-2021-9220
kernel-uek-debug-4.14.35-1902.10.4.el7uek.aarch64.rpm845af13840e185ee34bc88df9616569fELSA-2021-9220
kernel-uek-debug-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm3ddf1910ef4962f9a337c90bdb008187ELSA-2021-9220
kernel-uek-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm0b73c72534ac2478492a2b6db02506d4ELSA-2021-9220
kernel-uek-headers-4.14.35-1902.10.4.el7uek.aarch64.rpm7b764d4cf609e83258f5cf577f62301bELSA-2021-9222
kernel-uek-tools-4.14.35-1902.10.4.el7uek.aarch64.rpm19ef4868c6dd5f9729f1ca3b916dbb1bELSA-2021-9220
kernel-uek-tools-libs-4.14.35-1902.10.4.el7uek.aarch64.rpmf168f03e37eba4faa96d06596bd69255ELSA-2021-9220
kernel-uek-tools-libs-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm4a685441175e939e383226a364d9d13cELSA-2021-9222
perf-4.14.35-1902.10.4.el7uek.aarch64.rpmecf19f9437e52b23f92d783aeb03eb2dELSA-2021-9220
python-perf-4.14.35-1902.10.4.el7uek.aarch64.rpm5f87b567d12ec08f0691d7576fa45668ELSA-2021-9220
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1902.10.4.el7uek.src.rpmab804565e47e3f0ea789f6a9980a830dELSA-2021-9220
kernel-uek-4.14.35-1902.10.4.el7uek.x86_64.rpm062a16bf08c5b96301b7de35c7b478e6ELSA-2021-9220
kernel-uek-debug-4.14.35-1902.10.4.el7uek.x86_64.rpm096bb5e3e2050aadc76a3b4af1853429ELSA-2021-9220
kernel-uek-debug-devel-4.14.35-1902.10.4.el7uek.x86_64.rpm56878e24ba430397ca44ee26afe9c375ELSA-2021-9220
kernel-uek-devel-4.14.35-1902.10.4.el7uek.x86_64.rpmcd4bc6392863c41706bfb7add67998edELSA-2021-9220
kernel-uek-doc-4.14.35-1902.10.4.el7uek.noarch.rpm83dce2fdfe4c2fe4c80fa1101712d585ELSA-2021-9220
kernel-uek-tools-4.14.35-1902.10.4.el7uek.x86_64.rpm9551bcffa2ce207d82f2b4cc195acf28ELSA-2021-9220



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete