ELSA-2020-2664

ELSA-2020-2664 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-06-23

Description


[3.10.0-1127.13.1.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]

[3.10.0-1127.13.1]
- [x86] x86/speculation: Support old struct x86_cpu_id & x86_match_cpu() kABI (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [cpufreq] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827187 1827188] {CVE-2020-0543}
header (Waiman Long) [1827187 1827188] {CVE-2020-0543}

[3.10.0-1127.12.1]
- [x86] x86/speculation: Prevent deadlock on ssb_state::lock (Waiman Long) [1841121 1836322]
- [vfio] vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio/pci: call irq_bypass_unregister_producer() before freeing irq (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio_pci: Enable memory accesses before calling pci_map_rom (Alex Williamson) [1837297 1820632] {CVE-2020-12888}

[3.10.0-1127.11.1]
- [fs] cachefiles: Fix race between read_waiter and read_copier involving op->to_do (Dave Wysochanski) [1839757 1829662]


Related CVEs


CVE-2020-12888

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-3.10.0-1127.13.1.el7.src.rpmf1bde887fb2b25f42f39253206c24240303351a2991aadcf47edd1225edaa9dfELSA-2025-1281ol7_x86_64_latest
kernel-3.10.0-1127.13.1.el7.src.rpmf1bde887fb2b25f42f39253206c24240303351a2991aadcf47edd1225edaa9dfELSA-2025-1281ol7_x86_64_optional_latest
kernel-3.10.0-1127.13.1.el7.src.rpmf1bde887fb2b25f42f39253206c24240303351a2991aadcf47edd1225edaa9dfELSA-2025-1281ol7_x86_64_u8_patch
bpftool-3.10.0-1127.13.1.el7.x86_64.rpmcffca5888e03a1da4816929573d19a0accb3db638b8d1bdef4eb562b0dbb523dELSA-2025-1281ol7_x86_64_latest
bpftool-3.10.0-1127.13.1.el7.x86_64.rpmcffca5888e03a1da4816929573d19a0accb3db638b8d1bdef4eb562b0dbb523dELSA-2025-1281ol7_x86_64_u8_patch
kernel-3.10.0-1127.13.1.el7.x86_64.rpmdaed1c46c7d7b5b272c8f8ffc53f0697a9f4ce9f337dbd8637f80b569ab780b8ELSA-2025-1281ol7_x86_64_latest
kernel-3.10.0-1127.13.1.el7.x86_64.rpmdaed1c46c7d7b5b272c8f8ffc53f0697a9f4ce9f337dbd8637f80b569ab780b8ELSA-2025-1281ol7_x86_64_u8_patch
kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm3df15fe91156ccd4e3803853363fdeda83bdaad95bc023db4123efc29a88af2eELSA-2025-1281ol7_x86_64_latest
kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm3df15fe91156ccd4e3803853363fdeda83bdaad95bc023db4123efc29a88af2eELSA-2025-1281ol7_x86_64_u8_patch
kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpmdf4c0e2facb271bf1a7e1a97eeea74bf1f2ecfc7f8162790798d4fb7c791710eELSA-2025-1281ol7_x86_64_latest
kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpmdf4c0e2facb271bf1a7e1a97eeea74bf1f2ecfc7f8162790798d4fb7c791710eELSA-2025-1281ol7_x86_64_u8_patch
kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm8707d2226e1208d4d4201c28838f77068bc2e0fd17c3b5d71426f59434fbfc4bELSA-2025-1281ol7_x86_64_latest
kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm8707d2226e1208d4d4201c28838f77068bc2e0fd17c3b5d71426f59434fbfc4bELSA-2025-1281ol7_x86_64_u8_patch
kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpmadc669ddb11254249aafa7b1756934be8252807d51e18065e2b1a569c20690ecELSA-2025-1281ol7_x86_64_latest
kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpmadc669ddb11254249aafa7b1756934be8252807d51e18065e2b1a569c20690ecELSA-2025-1281ol7_x86_64_u8_patch
kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm144d7b33e8706d041ebf25a64042ce6fd2fbef66820fd1f76252478871c4d7dcELSA-2025-1281ol7_x86_64_latest
kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm144d7b33e8706d041ebf25a64042ce6fd2fbef66820fd1f76252478871c4d7dcELSA-2025-1281ol7_x86_64_u8_patch
kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm2eb8d7988107aeab7af317aac7b6acd97c25b48da77340485ff1a26c308e0a0dELSA-2025-1281exadata_dbserver_19.2.17.0.0_x86_64_base
kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm2eb8d7988107aeab7af317aac7b6acd97c25b48da77340485ff1a26c308e0a0dELSA-2025-1281exadata_dbserver_19.3.11.0.0_x86_64_base
kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm2eb8d7988107aeab7af317aac7b6acd97c25b48da77340485ff1a26c308e0a0dELSA-2025-1281exadata_dbserver_20.1.1.0.0_x86_64_base
kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm2eb8d7988107aeab7af317aac7b6acd97c25b48da77340485ff1a26c308e0a0dELSA-2025-1281ol7_x86_64_latest
kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm2eb8d7988107aeab7af317aac7b6acd97c25b48da77340485ff1a26c308e0a0dELSA-2025-1281ol7_x86_64_u8_patch
kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm5205621183bd85b699ba6d19683d877eb5d24b1c6e4e28c423d0d91a252d5732ELSA-2025-1281ol7_x86_64_latest
kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm5205621183bd85b699ba6d19683d877eb5d24b1c6e4e28c423d0d91a252d5732ELSA-2025-1281ol7_x86_64_u8_patch
kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm4accda89ada9ac440835d3a1200716411f214c27b528b85e46fe6633732a7629ELSA-2025-1281ol7_x86_64_latest
kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm4accda89ada9ac440835d3a1200716411f214c27b528b85e46fe6633732a7629ELSA-2025-1281ol7_x86_64_u8_patch
kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm130ffd8bea453ecfe107839fdc0bf857cd208c7567935f76ab57dd4477f5485dELSA-2025-1281ol7_x86_64_optional_latest
perf-3.10.0-1127.13.1.el7.x86_64.rpm1869d7ffbd9de3a3b5066529a91881b3184f36afd715948609e710a30accd40fELSA-2025-20019ol7_x86_64_latest
perf-3.10.0-1127.13.1.el7.x86_64.rpm1869d7ffbd9de3a3b5066529a91881b3184f36afd715948609e710a30accd40fELSA-2025-20019ol7_x86_64_u8_patch
python-perf-3.10.0-1127.13.1.el7.x86_64.rpme119513c0a0b81c64e9715117638e727f383cd5c8aead6d3289284314eeba271ELSA-2025-20019ol7_x86_64_latest
python-perf-3.10.0-1127.13.1.el7.x86_64.rpme119513c0a0b81c64e9715117638e727f383cd5c8aead6d3289284314eeba271ELSA-2025-20019ol7_x86_64_u8_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete