ELSA-2020-5533

ELSA-2020-5533 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-02-10

Description


[4.14.35-1902.10.7]
- rtlwifi: Fix potential overflow on P2P code (Laura Abbott) [Orabug: 30807747] {CVE-2019-17666}
- rds: fix an infoleak in rds_inc_info_copy (Kangjie Lu) [Orabug: 30770961] {CVE-2016-5244}
- KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332) (Paolo Bonzini) [Orabug: 30658694] {CVE-2019-19332}

[4.14.35-1902.10.6]
- IB/mlx4: Fix use after free in RDMA CM disconnect code path (Manjunath Patil)
- RDMA/cma: Relax device check in cma_match_net_dev() (Hakon Bugge) [Orabug: 30809126]
- IB/mlx4: Fix leak in id_map_find_del (Hakon Bugge) [Orabug: 30805810]
- net: IP6 defrag: use rbtrees in nf_conntrack_reasm.c (Peter Oskolkov) [Orabug: 30787503]
- net: IP6 defrag: use rbtrees for IPv6 defrag (Peter Oskolkov) [Orabug: 30787503]
- ipv6: remove dependency of nf_defrag_ipv6 on ipv6 module (Florian Westphal) [Orabug: 30787503]
- net: IP defrag: encapsulate rbtree defrag code into callable functions (Peter Oskolkov) [Orabug: 30787503]
- ipv6: frags: fix a lockdep false positive (Eric Dumazet) [Orabug: 30787503]

[4.14.35-1902.10.5]
- drm/i915/cmdparser: Fix jump whitelist clearing (Ben Hutchings) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gen8+: Add RC6 CTX corruption WA (Imre Deak) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Lower RM timeout to avoid DSI hard hangs (Uma Shankar) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Ignore Length operands during command matching (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Add support for backward jumps (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Use explicit goto for error paths (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Add gen9 BCS cmdparsing (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Allow parsing of unsized batches (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Add support for mandatory cmdparsing (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Remove Master tables from cmdparser (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Disable Secure Batches for gen6+ (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Rename gen7 cmdparser tables (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Move engine->needs_cmd_parser to engine->flags (Tvrtko Ursulin) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Dont use GPU relocations prior to cmdparser stalls (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Silence smatch for cmdparser (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Do not check past the cmd length. (Michal Srb) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Check reg_table_count before derefencing. (Michal Srb) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Prevent writing into a read-only object via a GGTT mmap (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gtt: Disable read-only support under GVT (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gtt: Read-only pages for insert_entries on bdw+ (Vivi, Rodrigo) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gtt: Add read only pages to gen8_pte_encode (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (Anchal Agarwal) [Orabug: 30681025]
- x86: microcode: propagate return value to siblings (Mihai Carabas) [Orabug: 30557081]
- x86/bugs: TSX not disabled at late loading (Mihai Carabas) [Orabug: 30557081]
- x86/bugs: missed initconst cpu_vuln_whitelist used at late loading (Mihai Carabas) [Orabug: 30659681]
- mwifiex: Fix mem leak in mwifiex_tm_cmd (YueHaibing) [Orabug: 30732918] {CVE-2019-20095}
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (YueHaibing) [Orabug: 30732937] {CVE-2019-20054}
- fjes: Handle workqueue allocation failure (Will Deacon) [Orabug: 30771875] {CVE-2019-16231}


Related CVEs


CVE-2019-16231
CVE-2019-20054
CVE-2019-17666
CVE-2016-5244
CVE-2019-20095
CVE-2019-3016
CVE-2019-0154
CVE-2019-15917
CVE-2019-19332

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1902.10.7.el7uek.src.rpm1c1443535c45f47c1d053ddcfdc66b99-
kernel-uek-4.14.35-1902.10.7.el7uek.aarch64.rpm675cc2b7820c898f1a14261233e93ba8-
kernel-uek-debug-4.14.35-1902.10.7.el7uek.aarch64.rpm57c007745504f93efd7a20b4cd3fa0c3-
kernel-uek-debug-devel-4.14.35-1902.10.7.el7uek.aarch64.rpmfb4f552e1f48391a3244739b83c0644e-
kernel-uek-devel-4.14.35-1902.10.7.el7uek.aarch64.rpm8a94e5fe3fc2b9d09495fa04ed9c2e33-
kernel-uek-headers-4.14.35-1902.10.7.el7uek.aarch64.rpme2dcc35cd017ebc5a8f25b879673824e-
kernel-uek-tools-4.14.35-1902.10.7.el7uek.aarch64.rpmaaefe9228bf958bc349bad5d68d28516-
kernel-uek-tools-libs-4.14.35-1902.10.7.el7uek.aarch64.rpm106dcaee23cfe3140fef5c314a851718-
kernel-uek-tools-libs-devel-4.14.35-1902.10.7.el7uek.aarch64.rpmb0cecef2d8ff102e3c9e881518314d7a-
perf-4.14.35-1902.10.7.el7uek.aarch64.rpmdb2b3341cbe6c2472371e7b3edefa80b-
python-perf-4.14.35-1902.10.7.el7uek.aarch64.rpmadd0fe3a16e57851baeb7bc8d872bddc-
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1902.10.7.el7uek.src.rpm1c1443535c45f47c1d053ddcfdc66b99-
kernel-uek-4.14.35-1902.10.7.el7uek.x86_64.rpmd514da6dc2f9789eca9523701f5c7f0a-
kernel-uek-debug-4.14.35-1902.10.7.el7uek.x86_64.rpm3bba3505015407997ac9cf57b832886e-
kernel-uek-debug-devel-4.14.35-1902.10.7.el7uek.x86_64.rpme9d7291e3721ec16123360cc159912ef-
kernel-uek-devel-4.14.35-1902.10.7.el7uek.x86_64.rpmeb37f41964b888464a794a705ba8c457-
kernel-uek-doc-4.14.35-1902.10.7.el7uek.noarch.rpm44ccb3269a53e8eb4a04737a9ea1945e-
kernel-uek-tools-4.14.35-1902.10.7.el7uek.x86_64.rpmde239350b4097f25599ce9ea03e47e1b-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete