ELSA-2020-5569

ELSA-2020-5569 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-03-15

Description


[4.14.35-1902.11.3]
- xfs: do async inactivation only when fs freezed (Junxiao Bi) [Orabug: 31013775]

[4.14.35-1902.11.2]
- ib/core: Cancel fmr delayed_worker when in shutdown phase of reboot system (Hans Westgaard Ry) [Orabug: 30967501]
- Revert 'printk: Default console logging level should be set to 4' (Cesar Roque) [Orabug: 30833249]
- cgroup: psi: fix memory leak when freeing a cgroup work function (Tom Hromatka) [Orabug: 30903264]

[4.14.35-1902.11.1]
- xfs: fix deadlock between shrinker and fs freeze (Junxiao Bi) [Orabug: 30657780]
- xfs: increase the default parallelism levels of pwork clients (Darrick J. Wong) [Orabug: 30657780]
- xfs: decide if inode needs inactivation (Darrick J. Wong) [Orabug: 30657780]
- xfs: refactor the predicate part of xfs_free_eofblocks (Darrick J. Wong) [Orabug: 30657780]
- mwifiex: fix unbalanced locking in mwifiex_process_country_ie() (Brian Norris) [Orabug: 30781858] {CVE-2019-14895}
- mwifiex: fix possible heap overflow in mwifiex_process_country_ie() (Ganapathi Bhat) [Orabug: 30781858] {CVE-2019-14895} {CVE-2019-14895}
- ipmi_ssif: avoid registering duplicate ssif interface (Kamlakant Patel) [Orabug: 30916684]
- ipmi: Fix NULL pointer dereference in ssif_probe (Gustavo A. R. Silva) [Orabug: 30916684]
- uio: Fix an Oops on load (Dan Carpenter) [Orabug: 30897832]
- drm/i915: Fix use-after-free when destroying GEM context (Tyler Hicks) [Orabug: 30860457] {CVE-2020-7053}
- xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT (Darrick J. Wong) [Orabug: 30788113]
- slub: extend slub debug to handle multiple slabs (Aaron Tomlin) [Orabug: 30903135]
- RAS/CEC: Fix binary search function (Borislav Petkov) [Orabug: 30897849]
- CIFS: fix POSIX lock leak and invalid ptr deref (Aurelien Aptel) [Orabug: 30809456]
- rds: Avoid flushing MRs in rds_rdma_drop_keys (aru kolappan) [Orabug: 30681066]

[4.14.35-1902.11.0]
- rds: Avoid qp overflow when posting invalidate/register mr with frwr (Hans Westgaard Ry) [Orabug: 30888677]
- rds: Use bitmap to designate dropped connections (Hakon Bugge) [Orabug: 30852643]
- rds: prevent use-after-free of rds conn in rds_send_drop_to() (Sharath Srinivasan) [Orabug: 30865079]
- media: b2c2-flexcop-usb: add sanity checking (Oliver Neukum) [Orabug: 30864532] {CVE-2019-15291}
- KVM: vmx: use MSR_IA32_TSX_CTRL to hard-disable TSX on guest that lack it (Paolo Bonzini) [Orabug: 30846856]
- KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality (Paolo Bonzini) [Orabug: 30846856]
- KVM: x86: implement MSR_IA32_TSX_CTRL effect on CPUID (Paolo Bonzini) [Orabug: 30846856]
- KVM: x86: do not modify masked bits of shared MSRs (Paolo Bonzini) [Orabug: 30846856]
- KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIES (Paolo Bonzini) [Orabug: 30846856]
- xen/ovmapi: whitelist more caches (Boris Ostrovsky) [Orabug: 30837856]
- mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame() (qize wang) [Orabug: 30819438] {CVE-2019-14901}
- drm/i915/gen9: Clear residual context state on context switch (Akeem G Abodunrin) [Orabug: 30773852] {CVE-2019-14615} {CVE-2019-14615}
- rds: unlock rs_snd_lock before calling rhashtable_insert_fast (aru kolappan) [Orabug: 30734590]


Related CVEs


CVE-2019-14895
CVE-2019-14615
CVE-2019-14901
CVE-2019-15291
CVE-2020-7053

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1902.11.3.el7uek.src.rpma8cc336caad1e6a5e48961488e8c43240d3309dde557be1b4ff1b3e91465c260ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-1902.11.3.el7uek.src.rpma8cc336caad1e6a5e48961488e8c43240d3309dde557be1b4ff1b3e91465c260ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-4.14.35-1902.11.3.el7uek.aarch64.rpm12e4b61883991709b8de30240546d629f99ed1af2721621e2866e3ae93881722ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-1902.11.3.el7uek.aarch64.rpm12e4b61883991709b8de30240546d629f99ed1af2721621e2866e3ae93881722ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-debug-4.14.35-1902.11.3.el7uek.aarch64.rpma9a1581beee478e8d8781195d0d554bf7e64a67e090040b04e1fa7576259be43ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-4.14.35-1902.11.3.el7uek.aarch64.rpma9a1581beee478e8d8781195d0d554bf7e64a67e090040b04e1fa7576259be43ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-debug-devel-4.14.35-1902.11.3.el7uek.aarch64.rpm94b4c54ad96b1bb28e877ac7ef76b40f26a6daa339b751c5a399f30526d2b45aELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-devel-4.14.35-1902.11.3.el7uek.aarch64.rpm94b4c54ad96b1bb28e877ac7ef76b40f26a6daa339b751c5a399f30526d2b45aELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-devel-4.14.35-1902.11.3.el7uek.aarch64.rpmd871c586b44290585f41e169f891525aa6fabdfb85966e22b2d504d1b5521851ELSA-2025-20190ol7_aarch64_latest
kernel-uek-devel-4.14.35-1902.11.3.el7uek.aarch64.rpmd871c586b44290585f41e169f891525aa6fabdfb85966e22b2d504d1b5521851ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-headers-4.14.35-1902.11.3.el7uek.aarch64.rpme5bd9e1b93fe02498282baf046c75ed626f8dbf6e2708f8c08bbd0aa3a3230b6ELBA-2025-20014ol7_aarch64_latest
kernel-uek-headers-4.14.35-1902.11.3.el7uek.aarch64.rpme5bd9e1b93fe02498282baf046c75ed626f8dbf6e2708f8c08bbd0aa3a3230b6ELBA-2025-20014ol7_aarch64_u7_patch
kernel-uek-tools-4.14.35-1902.11.3.el7uek.aarch64.rpmf4bab703551bbc4bb55ba1c4aa1c3ceacacfaaee7231ccda83c9d5842cb0b554ELSA-2025-20190ol7_aarch64_latest
kernel-uek-tools-4.14.35-1902.11.3.el7uek.aarch64.rpmf4bab703551bbc4bb55ba1c4aa1c3ceacacfaaee7231ccda83c9d5842cb0b554ELSA-2025-20190ol7_aarch64_u7_patch
kernel-uek-tools-libs-4.14.35-1902.11.3.el7uek.aarch64.rpmd6ee0c56da3a2863a78cbd0a92d106a3eeb5abe8f6398cf11cd755bde8e78bb4ELSA-2025-20019ol7_aarch64_latest
kernel-uek-tools-libs-4.14.35-1902.11.3.el7uek.aarch64.rpmd6ee0c56da3a2863a78cbd0a92d106a3eeb5abe8f6398cf11cd755bde8e78bb4ELSA-2025-20019ol7_aarch64_u7_patch
kernel-uek-tools-libs-devel-4.14.35-1902.11.3.el7uek.aarch64.rpm272f1bd68e016d942a94156bb2e817a561d378ec36015185e01b7a864a11e295ELBA-2025-20014ol7_aarch64_latest
kernel-uek-tools-libs-devel-4.14.35-1902.11.3.el7uek.aarch64.rpm272f1bd68e016d942a94156bb2e817a561d378ec36015185e01b7a864a11e295ELBA-2025-20014ol7_aarch64_u7_patch
perf-4.14.35-1902.11.3.el7uek.aarch64.rpm4af7912de206d30a62e3b9d5c5d6c7ef0d398afc2218a9aae14d9de09d0f0629ELSA-2025-20019ol7_aarch64_latest
perf-4.14.35-1902.11.3.el7uek.aarch64.rpm4af7912de206d30a62e3b9d5c5d6c7ef0d398afc2218a9aae14d9de09d0f0629ELSA-2025-20019ol7_aarch64_u7_patch
python-perf-4.14.35-1902.11.3.el7uek.aarch64.rpmb902544e08e2e610dd4a939e02d396482ae07a26f929eedad9eb1394def2fedbELSA-2025-20019ol7_aarch64_latest
python-perf-4.14.35-1902.11.3.el7uek.aarch64.rpmb902544e08e2e610dd4a939e02d396482ae07a26f929eedad9eb1394def2fedbELSA-2025-20019ol7_aarch64_u7_patch
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1902.11.3.el7uek.src.rpma8cc336caad1e6a5e48961488e8c43240d3309dde557be1b4ff1b3e91465c260ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-4.14.35-1902.11.3.el7uek.x86_64.rpmf86f6cff00ecc63343d3bc1d78ab4b3826701f33f8a44fb453b01b657d1b7eb6ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-4.14.35-1902.11.3.el7uek.x86_64.rpm0453a10945d8a5277eeb325f79bdde257d8e0aafc784e301a9a64f42386422efELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-devel-4.14.35-1902.11.3.el7uek.x86_64.rpm74bcf995a93fc39627abfb5fd96900d1f24b09178f6d1dfeb702099c24f420b5ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-devel-4.14.35-1902.11.3.el7uek.x86_64.rpmee1828240d94a4d5774e3dd3bf2351d375b1c3646ac4992dad611e8e9941212dELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-doc-4.14.35-1902.11.3.el7uek.noarch.rpma1ad2a12f2c8daa7cf269a3e5b33d0e75f684a08406987dca309248ffc2d5a78ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-tools-4.14.35-1902.11.3.el7uek.x86_64.rpmdf1ed239fb1787051cff9ac304defd78e7b72b015f2747b9c119734424ce0e7aELSA-2025-20190ol7_x86_64_UEKR5_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete