ELSA-2020-2933

ELSA-2020-2933 - kernel security and bug fix update

Type:SECURITY
Severity:MODERATE
Release Date:2020-07-17

Description


[2.6.32-754.31.1.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.31.1]
- [x86] x86/speculation: Provide SRBDS late microcode loading support (Waiman Long) [1827185] {CVE-2020-0543}
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827185] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827185] {CVE-2020-0543}
- [netdrv] bonding/802.3ad: fix link_failure_count tracking (Patrick Talbert) [1841819]
- [mm] mm: migration: add migrate_entry_wait_huge() (Waiman Long) [1839653]
- [powerpc] powerpc/book3s64: Fix link stack flush on context switch (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: support nospectre_v2 cmdline option (Gustavo Duarte) [1796810]
- [powerpc] powerpc/security: Fix spectre_v2 reporting (Gustavo Duarte) [1796810]
- [powerpc] powerpc/fsl: Update Spectre v2 reporting (Gustavo Duarte) [1796810]
- [powerpc] powerpc/fsl: Add nospectre_v2 command line argument (Gustavo Duarte) [1796810]
- [powerpc] powerpc/fsl: Fix spectre_v2 mitigations reporting (Gustavo Duarte) [1796810]
- [powerpc] powerpc/pseries: Query hypervisor for count cache flush settings (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add support for software count cache flush (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add new security feature flags for count cache flush (Gustavo Duarte) [1796810]
- [powerpc] powerpc/asm: Add a patch_site macro & helpers for patching instructions (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Make meltdown reporting Book3S 64 specific (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Call setup_barrier_nospec() from setup_arch() (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Disable the speculation barrier from the command line (Gustavo Duarte) [1796810]
- [powerpc] powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Enhance the information in cpu_show_spectre_v1() (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Use barrier_nospec in syscall entry (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Enable barrier_nospec based on firmware settings (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Patch barrier_nospec in modules (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add support for ori barrier_nospec patching (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add barrier_nospec (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Add helper to check if offset is within relative branch range (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Have patch_instruction detect faults (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Introduce asm-prototypes.h (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Move local setup.h declarations to arch includes (Gustavo Duarte) [1796810]


Related CVEs


CVE-2019-18660

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-754.31.1.el6.src.rpm113969dcfac7047938e92da2b4ed8ffcELSA-2021-9212
kernel-2.6.32-754.31.1.el6.i686.rpmf42039fb527afe6b0751d43fa4c376b0ELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.31.1.el6.noarch.rpm0da5c6ac2d5feabdf1a9ead8e2ee2f08ELSA-2021-9212
kernel-debug-2.6.32-754.31.1.el6.i686.rpma910e1c2405f0c7e1344ec797f420a9cELSA-2021-9212
kernel-debug-devel-2.6.32-754.31.1.el6.i686.rpm673f3facdf58b15d9f14a9ee59868d2eELSA-2021-9212
kernel-devel-2.6.32-754.31.1.el6.i686.rpm9b84a1d3a6d5b3991a98e247399010c9ELSA-2021-9212
kernel-doc-2.6.32-754.31.1.el6.noarch.rpma885fe8e2a015fdd5741b2db57d1c161ELSA-2021-9212
kernel-firmware-2.6.32-754.31.1.el6.noarch.rpm6f01aed985ee498b154741ba748cb160ELSA-2021-9212
kernel-headers-2.6.32-754.31.1.el6.i686.rpmdff62ae1acf0b24702579fa4fd540cdcELSA-2021-9212
perf-2.6.32-754.31.1.el6.i686.rpm28f0611de4790d2ddb4fa37d86ec3efcELSA-2021-9212
python-perf-2.6.32-754.31.1.el6.i686.rpm5635240160ce521d791e88d1770f3c90ELSA-2021-9212
Oracle Linux 6 (x86_64) kernel-2.6.32-754.31.1.el6.src.rpm113969dcfac7047938e92da2b4ed8ffcELSA-2021-9212
kernel-2.6.32-754.31.1.el6.x86_64.rpm613e16618feb4f7eadabbfd6d4a8901cELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.31.1.el6.noarch.rpm0da5c6ac2d5feabdf1a9ead8e2ee2f08ELSA-2021-9212
kernel-debug-2.6.32-754.31.1.el6.x86_64.rpm151c33c1e451eb7de9c0f4284d2c9fcbELSA-2021-9212
kernel-debug-devel-2.6.32-754.31.1.el6.i686.rpm673f3facdf58b15d9f14a9ee59868d2eELSA-2021-9212
kernel-debug-devel-2.6.32-754.31.1.el6.x86_64.rpm49f0f453669a97caf65539f62353e34fELSA-2021-9212
kernel-devel-2.6.32-754.31.1.el6.x86_64.rpm52170325e08deb62634ac120f4244b67ELSA-2021-9212
kernel-doc-2.6.32-754.31.1.el6.noarch.rpma885fe8e2a015fdd5741b2db57d1c161ELSA-2021-9212
kernel-firmware-2.6.32-754.31.1.el6.noarch.rpm6f01aed985ee498b154741ba748cb160ELSA-2021-9212
kernel-headers-2.6.32-754.31.1.el6.x86_64.rpm06d1b667fef829dac1bfaa915a9a65b0ELSA-2021-9212
perf-2.6.32-754.31.1.el6.x86_64.rpm85fa6d4946f5711120fbcd9608095e96ELSA-2021-9212
python-perf-2.6.32-754.31.1.el6.x86_64.rpm11057290a893a907aa297070233fc900ELSA-2021-9212



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete