ELSA-2020-5533

ELSA-2020-5533 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-02-10

Description


[4.14.35-1902.10.7]
- rtlwifi: Fix potential overflow on P2P code (Laura Abbott) [Orabug: 30807747] {CVE-2019-17666}
- rds: fix an infoleak in rds_inc_info_copy (Kangjie Lu) [Orabug: 30770961] {CVE-2016-5244}
- KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332) (Paolo Bonzini) [Orabug: 30658694] {CVE-2019-19332}

[4.14.35-1902.10.6]
- IB/mlx4: Fix use after free in RDMA CM disconnect code path (Manjunath Patil)
- RDMA/cma: Relax device check in cma_match_net_dev() (Hakon Bugge) [Orabug: 30809126]
- IB/mlx4: Fix leak in id_map_find_del (Hakon Bugge) [Orabug: 30805810]
- net: IP6 defrag: use rbtrees in nf_conntrack_reasm.c (Peter Oskolkov) [Orabug: 30787503]
- net: IP6 defrag: use rbtrees for IPv6 defrag (Peter Oskolkov) [Orabug: 30787503]
- ipv6: remove dependency of nf_defrag_ipv6 on ipv6 module (Florian Westphal) [Orabug: 30787503]
- net: IP defrag: encapsulate rbtree defrag code into callable functions (Peter Oskolkov) [Orabug: 30787503]
- ipv6: frags: fix a lockdep false positive (Eric Dumazet) [Orabug: 30787503]

[4.14.35-1902.10.5]
- drm/i915/cmdparser: Fix jump whitelist clearing (Ben Hutchings) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gen8+: Add RC6 CTX corruption WA (Imre Deak) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Lower RM timeout to avoid DSI hard hangs (Uma Shankar) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Ignore Length operands during command matching (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Add support for backward jumps (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Use explicit goto for error paths (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Add gen9 BCS cmdparsing (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Allow parsing of unsized batches (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Add support for mandatory cmdparsing (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Remove Master tables from cmdparser (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Disable Secure Batches for gen6+ (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Rename gen7 cmdparser tables (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Move engine->needs_cmd_parser to engine->flags (Tvrtko Ursulin) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Dont use GPU relocations prior to cmdparser stalls (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Silence smatch for cmdparser (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Do not check past the cmd length. (Michal Srb) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/cmdparser: Check reg_table_count before derefencing. (Michal Srb) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915: Prevent writing into a read-only object via a GGTT mmap (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gtt: Disable read-only support under GVT (Chris Wilson) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gtt: Read-only pages for insert_entries on bdw+ (Vivi, Rodrigo) [Orabug: 30656819] {CVE-2019-0154}
- drm/i915/gtt: Add read only pages to gen8_pte_encode (Jon Bloomfield) [Orabug: 30656819] {CVE-2019-0154}
- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (Anchal Agarwal) [Orabug: 30681025]
- x86: microcode: propagate return value to siblings (Mihai Carabas) [Orabug: 30557081]
- x86/bugs: TSX not disabled at late loading (Mihai Carabas) [Orabug: 30557081]
- x86/bugs: missed initconst cpu_vuln_whitelist used at late loading (Mihai Carabas) [Orabug: 30659681]
- mwifiex: Fix mem leak in mwifiex_tm_cmd (YueHaibing) [Orabug: 30732918] {CVE-2019-20095}
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (YueHaibing) [Orabug: 30732937] {CVE-2019-20054}
- fjes: Handle workqueue allocation failure (Will Deacon) [Orabug: 30771875] {CVE-2019-16231}


Related CVEs


CVE-2019-16231
CVE-2019-20054
CVE-2019-17666
CVE-2016-5244
CVE-2019-20095
CVE-2019-3016
CVE-2019-0154
CVE-2019-15917
CVE-2019-19332

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1902.10.7.el7uek.src.rpmeeaad8f473d11adf90064c3b0289cc8c07d549a056fc27baf9fa5dc7270c24bdELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-1902.10.7.el7uek.src.rpmeeaad8f473d11adf90064c3b0289cc8c07d549a056fc27baf9fa5dc7270c24bdELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-4.14.35-1902.10.7.el7uek.aarch64.rpm0fe172d0c7c246ebabbeef1c9d9925b001c488c46ac28a4d74a4dff8b10f78b8ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-1902.10.7.el7uek.aarch64.rpm0fe172d0c7c246ebabbeef1c9d9925b001c488c46ac28a4d74a4dff8b10f78b8ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-debug-4.14.35-1902.10.7.el7uek.aarch64.rpm8152670a1a2e2368312ff46e2d4f75b1ab35548010f41e4d8ec4ab3562661fdbELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-4.14.35-1902.10.7.el7uek.aarch64.rpm8152670a1a2e2368312ff46e2d4f75b1ab35548010f41e4d8ec4ab3562661fdbELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-debug-devel-4.14.35-1902.10.7.el7uek.aarch64.rpm9e6298f5a4f07825fb6cab0c897d9a41810620fe83fafd2f4b2c1dbb5a1792d8ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-devel-4.14.35-1902.10.7.el7uek.aarch64.rpm9e6298f5a4f07825fb6cab0c897d9a41810620fe83fafd2f4b2c1dbb5a1792d8ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-devel-4.14.35-1902.10.7.el7uek.aarch64.rpm98868e3e29278f5687ff08d2769c7d5d131ff7331318617813cf4f4da2fab315ELSA-2025-20190ol7_aarch64_latest
kernel-uek-devel-4.14.35-1902.10.7.el7uek.aarch64.rpm98868e3e29278f5687ff08d2769c7d5d131ff7331318617813cf4f4da2fab315ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-headers-4.14.35-1902.10.7.el7uek.aarch64.rpmf89c9b64b852d3eaea7fee97d4bf0a77278fb874054741e5b6541546ed75e671ELBA-2025-20014ol7_aarch64_latest
kernel-uek-headers-4.14.35-1902.10.7.el7uek.aarch64.rpmf89c9b64b852d3eaea7fee97d4bf0a77278fb874054741e5b6541546ed75e671ELBA-2025-20014ol7_aarch64_u7_patch
kernel-uek-tools-4.14.35-1902.10.7.el7uek.aarch64.rpmef8322f01c4f58c09bdcdbfcae61df60bc495cb5fd795bc71d042bcb649d2987ELSA-2025-20190ol7_aarch64_latest
kernel-uek-tools-4.14.35-1902.10.7.el7uek.aarch64.rpmef8322f01c4f58c09bdcdbfcae61df60bc495cb5fd795bc71d042bcb649d2987ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-tools-libs-4.14.35-1902.10.7.el7uek.aarch64.rpm8152ace313a2356822598f01f887e0b1dc802c151dce1cbfe34259fc5e0f1bb0ELSA-2025-20019ol7_aarch64_latest
kernel-uek-tools-libs-4.14.35-1902.10.7.el7uek.aarch64.rpm8152ace313a2356822598f01f887e0b1dc802c151dce1cbfe34259fc5e0f1bb0ELSA-2025-20019ol7_aarch64_u7_patch
kernel-uek-tools-libs-devel-4.14.35-1902.10.7.el7uek.aarch64.rpmdd542b6bcdeb10d1b95b76aa244eb56b45dac84ba38a8a079e0b40ea9147dcaaELBA-2025-20014ol7_aarch64_latest
kernel-uek-tools-libs-devel-4.14.35-1902.10.7.el7uek.aarch64.rpmdd542b6bcdeb10d1b95b76aa244eb56b45dac84ba38a8a079e0b40ea9147dcaaELBA-2025-20014ol7_aarch64_u7_patch
perf-4.14.35-1902.10.7.el7uek.aarch64.rpmfbe7b1567a500e42ee8ad6a0b3ac24813c916e253900d449d9f476679a9c7592ELSA-2025-20019ol7_aarch64_latest
perf-4.14.35-1902.10.7.el7uek.aarch64.rpmfbe7b1567a500e42ee8ad6a0b3ac24813c916e253900d449d9f476679a9c7592ELSA-2025-20019ol7_aarch64_u7_patch
python-perf-4.14.35-1902.10.7.el7uek.aarch64.rpm6285c2171eafef3c806ff5b8ec34b6a39bb13004525906a57aeea0f57e261c25ELSA-2025-20019ol7_aarch64_latest
python-perf-4.14.35-1902.10.7.el7uek.aarch64.rpm6285c2171eafef3c806ff5b8ec34b6a39bb13004525906a57aeea0f57e261c25ELSA-2025-20019ol7_aarch64_u7_patch
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1902.10.7.el7uek.src.rpmeeaad8f473d11adf90064c3b0289cc8c07d549a056fc27baf9fa5dc7270c24bdELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-4.14.35-1902.10.7.el7uek.x86_64.rpm0c4569910e414f49227cdf13061cf203f4c75c2a3b14b7cc065a8bafe3e264ebELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-4.14.35-1902.10.7.el7uek.x86_64.rpm0f4995fbc7da6006b27918918abe4da1e8e0a5518d83199d7a0092704ec62a9fELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-devel-4.14.35-1902.10.7.el7uek.x86_64.rpm2a1bcbf25866c3bfd26eefa5f3cb6a4a0bb17a7efd9dd5b29b5281358dadeb90ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-devel-4.14.35-1902.10.7.el7uek.x86_64.rpmcc2b86a3b05801ffae44111d1772aa82e67eb90d3970e2a9e37cbd9aa647690cELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-doc-4.14.35-1902.10.7.el7uek.noarch.rpmbd8fb3e5183476e8669d5d9a96b923e6ee41c6efa16cd230d6929ac2f8e78096ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-tools-4.14.35-1902.10.7.el7uek.x86_64.rpmd22d953de15c384a1c31bab5d9a557e372ce1f2ea2a974b3f8996123811f18f4ELSA-2025-20190ol7_x86_64_UEKR5_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete