ELSA-2020-5543

ELSA-2020-5543 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-02-24

Description


[4.1.12-124.36.4]
- KVM: nVMX: Check IO instruction VM-exit conditions (Oliver Upton) [Orabug: 30944739] {CVE-2020-2732}
- KVM: nVMX: Refactor IO bitmap checks into helper function (Oliver Upton) [Orabug: 30944739] {CVE-2020-2732}
- KVM: nVMX: Don't emulate instructions in guest mode (Paolo Bonzini) [Orabug: 30944739] {CVE-2020-2732}


Related CVEs


CVE-2020-2732

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.36.4.el6uek.src.rpmb295a5ea681801fa3437ceae26075739ELSA-2020-5866
kernel-uek-4.1.12-124.36.4.el6uek.x86_64.rpm2fe24a11abca8b35ddbf22299d022a5dELSA-2020-5866
kernel-uek-debug-4.1.12-124.36.4.el6uek.x86_64.rpm75e2ad6f8077edee0c9497d27039454aELSA-2020-5866
kernel-uek-debug-devel-4.1.12-124.36.4.el6uek.x86_64.rpm4d4ef7aed49f1ab69cc2045e4e1a125eELSA-2020-5866
kernel-uek-devel-4.1.12-124.36.4.el6uek.x86_64.rpmf118b481758aae70a63b0e5aba09a382ELSA-2020-5866
kernel-uek-doc-4.1.12-124.36.4.el6uek.noarch.rpm4dee682773a943025914bddac1b494c5ELSA-2020-5866
kernel-uek-firmware-4.1.12-124.36.4.el6uek.noarch.rpm5c2e10563b5958e780f3fa8300c95cf9ELSA-2020-5866
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.36.4.el7uek.src.rpm92dd5868f725cf60729e07eaddb2365cELSA-2020-5884
kernel-uek-4.1.12-124.36.4.el7uek.x86_64.rpm67b7789b7a63ed671a10c015952490adELSA-2020-5884
kernel-uek-debug-4.1.12-124.36.4.el7uek.x86_64.rpm2c3b0330b3574d8069ebd893fac11539ELSA-2020-5884
kernel-uek-debug-devel-4.1.12-124.36.4.el7uek.x86_64.rpmdc3baf38a8f501bb245dc47edc282089ELSA-2020-5884
kernel-uek-devel-4.1.12-124.36.4.el7uek.x86_64.rpmad295a8ced31832ba2db48cd54420fb0ELSA-2020-5884
kernel-uek-doc-4.1.12-124.36.4.el7uek.noarch.rpm89a45360828c4b6f407d48a06ee2786cELSA-2020-5884
kernel-uek-firmware-4.1.12-124.36.4.el7uek.noarch.rpm4fb48af49cabbab65afb388d734d9008ELSA-2020-5866



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete