ELSA-2020-5526

ELSA-2020-5526 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-01-30

Description


[4.14.35-1902.10.4.el7uek]
- kvm: Don't reference vcpu->arch.st in arch-independent code (Boris Ostrovsky) [Orabug: 30489861]
- kvm: fix compile on s390 part 2 (Christian Borntraeger) [Orabug: 30489861]
- kvm: fix compilation on s390 (Paolo Bonzini) [Orabug: 30489861]
- kvm: fix compilation on aarch64 (Paolo Bonzini) [Orabug: 30489861]

[4.14.35-1902.10.3.el7uek]
- x86/KVM: Clean up host's steal time structure (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/kvm: Cache gfn to pfn translation (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/kvm: Introduce kvm_(un)map_gfn() (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016}
- KVM: Properly check if page is valid in kvm_vcpu_unmap (KarimAllah Ahmed) [Orabug: 30489861]
- KVM: Introduce a new guest mapping API (KarimAllah Ahmed) [Orabug: 30489861]
- KVM: x86: svm: make sure NMI is injected after nmi_singlestep (Vitaly Kuznetsov) [Orabug: 30714532]


Related CVEs


CVE-2019-15917
CVE-2019-3016

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1902.10.4.el7uek.src.rpmf88dfcdde050a090f20010abaf0983c7cf423effae4839e427f1cfef456b79bdELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-1902.10.4.el7uek.src.rpmf88dfcdde050a090f20010abaf0983c7cf423effae4839e427f1cfef456b79bdELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-4.14.35-1902.10.4.el7uek.aarch64.rpm57664d3d848ee19ed1b7328fc5802ca5634c18fbadec86e9a1d7fc4f4583acd0ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-1902.10.4.el7uek.aarch64.rpm57664d3d848ee19ed1b7328fc5802ca5634c18fbadec86e9a1d7fc4f4583acd0ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-debug-4.14.35-1902.10.4.el7uek.aarch64.rpm431f0ffc75fb4e60f68a15051af37b8937a823bda55c55f3ef7a06a11c3bc81aELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-4.14.35-1902.10.4.el7uek.aarch64.rpm431f0ffc75fb4e60f68a15051af37b8937a823bda55c55f3ef7a06a11c3bc81aELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-debug-devel-4.14.35-1902.10.4.el7uek.aarch64.rpme5b2310c7fbe71c0817d420d8034daf01bf3435412133962c87a5c5bc39af0c7ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-devel-4.14.35-1902.10.4.el7uek.aarch64.rpme5b2310c7fbe71c0817d420d8034daf01bf3435412133962c87a5c5bc39af0c7ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-devel-4.14.35-1902.10.4.el7uek.aarch64.rpmfed020632e3704c0ac422ec331f167113a7d2839d6e94e42c51fb02c9e4ede79ELSA-2025-20190ol7_aarch64_latest
kernel-uek-devel-4.14.35-1902.10.4.el7uek.aarch64.rpmfed020632e3704c0ac422ec331f167113a7d2839d6e94e42c51fb02c9e4ede79ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-headers-4.14.35-1902.10.4.el7uek.aarch64.rpmdc227de45560a04bd87e280617b217b09b599b45ff86e25094026e415632b9c1ELBA-2025-20014ol7_aarch64_latest
kernel-uek-headers-4.14.35-1902.10.4.el7uek.aarch64.rpmdc227de45560a04bd87e280617b217b09b599b45ff86e25094026e415632b9c1ELBA-2025-20014ol7_aarch64_u7_patch
kernel-uek-tools-4.14.35-1902.10.4.el7uek.aarch64.rpm1b8208036afd3d0073f8d850a7f127ffd558b98adf28ac2a07486569e8c1b45cELSA-2025-20190ol7_aarch64_latest
kernel-uek-tools-4.14.35-1902.10.4.el7uek.aarch64.rpm1b8208036afd3d0073f8d850a7f127ffd558b98adf28ac2a07486569e8c1b45cELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-tools-libs-4.14.35-1902.10.4.el7uek.aarch64.rpm46b42297808f8defc2d6e4f8afad07903b4f65c357b8746d9fdfe78b11e90a96ELSA-2025-20019ol7_aarch64_latest
kernel-uek-tools-libs-4.14.35-1902.10.4.el7uek.aarch64.rpm46b42297808f8defc2d6e4f8afad07903b4f65c357b8746d9fdfe78b11e90a96ELSA-2025-20019ol7_aarch64_u7_patch
kernel-uek-tools-libs-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm4f78def268f77e2d563d22b63af3c7385f855cd2bd2d7dcbad345f323510ff9fELBA-2025-20014ol7_aarch64_latest
kernel-uek-tools-libs-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm4f78def268f77e2d563d22b63af3c7385f855cd2bd2d7dcbad345f323510ff9fELBA-2025-20014ol7_aarch64_u7_patch
perf-4.14.35-1902.10.4.el7uek.aarch64.rpm3ed85c06865ae4b3b6b4d203cbe017ae9630bc25da96e44e5541004d2146a156ELSA-2025-20019ol7_aarch64_latest
perf-4.14.35-1902.10.4.el7uek.aarch64.rpm3ed85c06865ae4b3b6b4d203cbe017ae9630bc25da96e44e5541004d2146a156ELSA-2025-20019ol7_aarch64_u7_patch
python-perf-4.14.35-1902.10.4.el7uek.aarch64.rpmb5342afe44489f1219dd3a65dddcc4fc646468d0c0ff786daecaa753a45a5a92ELSA-2025-20019ol7_aarch64_latest
python-perf-4.14.35-1902.10.4.el7uek.aarch64.rpmb5342afe44489f1219dd3a65dddcc4fc646468d0c0ff786daecaa753a45a5a92ELSA-2025-20019ol7_aarch64_u7_patch
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1902.10.4.el7uek.src.rpmf88dfcdde050a090f20010abaf0983c7cf423effae4839e427f1cfef456b79bdELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-4.14.35-1902.10.4.el7uek.x86_64.rpm4b7a2bfec8b3bcccf12111fb17b3db67adf7830a1b04933b5539be61101c1335ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-4.14.35-1902.10.4.el7uek.x86_64.rpm7c24f12d57b11b586617f27a7b879ce90828d183a3678880de64301ef2ac824bELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-devel-4.14.35-1902.10.4.el7uek.x86_64.rpmcea07fc4a8cc4ffaeaf72f92afab77b7159f3e2da0774be1e53cbd88862716ffELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-devel-4.14.35-1902.10.4.el7uek.x86_64.rpmd6fc19a2d41f40cf36201a5def6bc50d4dd9b185727407f97a2a2c67980470e4ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-doc-4.14.35-1902.10.4.el7uek.noarch.rpmdd6e4ea8a3539e262d6aea616891115ce71d0f720f051232e1f1d7bde4a9774dELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-tools-4.14.35-1902.10.4.el7uek.x86_64.rpm5743ca2ae794cdfb1d71350f62ae9ed51b0d2f9c09e435e554bd1530a2e36051ELSA-2025-20190ol7_x86_64_UEKR5_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete