ELSA-2020-5663

ELSA-2020-5663 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-04-27

Description


[5.4.17-2011.1.2]
- ctf: discard CTF from the vDSO (Nick Alcock) [Orabug: 31194036]

[5.4.17-2011.1.1]
- slcan: Don't transmit uninitialized stack data in padding (Richard Palethorpe) [Orabug: 31136750] {CVE-2020-11494}
- blktrace: Protect q->blk_trace with RCU (Jan Kara) [Orabug: 31123573] {CVE-2019-19768}
- KVM: x86: clear stale x86_emulate_ctxt->intercept value (Vitaly Kuznetsov) [Orabug: 31118688]
- perf/x86/amd: Add support for Large Increment per Cycle Events (Kim Phillips) [Orabug: 31104924]
- perf/x86/amd: Constrain Large Increment per Cycle events (Kim Phillips) [Orabug: 31104924]
- kvm/svm: PKU not currently supported (John Allen) [Orabug: 31104924]
- KVM: SVM: Override default MMIO mask if memory encryption is enabled (Tom Lendacky) [Orabug: 31104924]
- EDAC/amd64: Drop some family checks for newer systems (Yazen Ghannam) [Orabug: 31104924]
- x86/amd_nb: Add Family 19h PCI IDs (Yazen Ghannam) [Orabug: 31104924]
- EDAC/mce_amd: Always load on SMCA systems (Yazen Ghannam) [Orabug: 31104924]
- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (Yazen Ghannam) [Orabug: 31104924]
- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (Yazen Ghannam) [Orabug: 31104924]
- EDAC/amd64: Check for memory before fully initializing an instance (Yazen Ghannam) [Orabug: 31104924]
- EDAC/amd64: Use cached data when checking for ECC (Yazen Ghannam) [Orabug: 31104924]
- EDAC/amd64: Save max number of controllers to family type (Yazen Ghannam) [Orabug: 31104924]
- EDAC/amd64: Gather hardware information early (Yazen Ghannam) [Orabug: 31104924]
- EDAC/amd64: Make struct amd64_family_type global (Yazen Ghannam) [Orabug: 31104924]
- floppy: check FDC index for errors before assigning it (Linus Torvalds) [Orabug: 31067510] {CVE-2020-9383}
- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (Tom Lendacky) [Orabug: 31012269]
- KVM: SVM: Serialize access to the SEV ASID bitmap (Tom Lendacky) [Orabug: 31012269]
- iommu/vt-d: Allow devices with RMRRs to use identity domain (Lu Baolu) [Orabug: 31127400]

[5.4.17-2011.1.0]
- vhost: Check docket sk_family instead of call getname (Eugenio Perez) [Orabug: 31085989] {CVE-2020-10942}
- selftests/net: add definition for SOL_DCCP to fix compilation errors for old libc (Alan Maguire) [Orabug: 31078892]
- kernel: cpu.c: fix print typo about SMT status (Mihai Carabas) [Orabug: 31053334]
- nfs: optimise readdir cache page invalidation (Dai Ngo) [Orabug: 31044292]
- NFS: Directory page cache pages need to be locked when read (Trond Myklebust) [Orabug: 31044292]
- rds: transport module should be auto loaded when transport is set (Rao Shoaib) [Orabug: 31032126]
- efi: Fix a race and a buffer overflow while reading efivars via sysfs (Vladis Dronov) [Orabug: 31020408]
- net: Support GRO/GSO fraglist chaining. (Steffen Klassert) [Orabug: 30670829]
- net: Add fraglist GRO/GSO feature flags (Steffen Klassert) [Orabug: 30670829]
- udp: Support UDP fraglist GRO/GSO. (Steffen Klassert) [Orabug: 30670829]
- net: remove the check argument from __skb_gro_checksum_convert (Li RongQing) [Orabug: 30670829]
- Revert 'nvme_fc: add module to ops template to allow module references' (John Donnelly) [Orabug: 31119387]
- ext4: add cond_resched() to ext4_protect_reserved_inode (Shijie Luo) [Orabug: 31067112] {CVE-2020-8992}
- dsa: disable module unloading for ARM64 (Allen Pais) [Orabug: 30456791]
- bpf: Undo incorrect __reg_bound_offset32 handling (Daniel Borkmann) [Orabug: 31127385] {CVE-2020-8835}
- bpf: Fix tnum constraints for 32-bit comparisons (Jann Horn) [Orabug: 31127385] {CVE-2020-8835}


Related CVEs


CVE-2020-10942
CVE-2019-19768
CVE-2020-8835
CVE-2020-9383
CVE-2020-11494
CVE-2020-8992

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2011.1.2.el7uek.src.rpmdbf2d58b1e9fdb56672786ae40e265fdELSA-2021-9220
kernel-uek-5.4.17-2011.1.2.el7uek.aarch64.rpm541957192625c660cd7d1248b963d677ELSA-2021-9220
kernel-uek-debug-5.4.17-2011.1.2.el7uek.aarch64.rpmfa05fecb952a5d59dca921c19d6293aaELSA-2021-9220
kernel-uek-debug-devel-5.4.17-2011.1.2.el7uek.aarch64.rpm56f4403025e5ec100921e694e215a429ELSA-2021-9220
kernel-uek-devel-5.4.17-2011.1.2.el7uek.aarch64.rpm4efb3ab0dc0af733ebfdcd9b658f9e2bELSA-2021-9220
kernel-uek-doc-5.4.17-2011.1.2.el7uek.noarch.rpm826d7a84b0a2c1d05c4e4dd0627c5f02ELSA-2021-9220
kernel-uek-tools-5.4.17-2011.1.2.el7uek.aarch64.rpm40ed2141a4de32186cce248a2714802cELSA-2021-9220
kernel-uek-tools-libs-5.4.17-2011.1.2.el7uek.aarch64.rpm153ad3b4e7fd8ee3f83fc4ca5aad328bELSA-2021-9220
perf-5.4.17-2011.1.2.el7uek.aarch64.rpm9986a558a69519f74e3d269be7f24d84ELSA-2021-9220
python-perf-5.4.17-2011.1.2.el7uek.aarch64.rpm6880bf7cecdf8e505dde407c82e5d6b5ELSA-2021-9220
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2011.1.2.el7uek.src.rpmdbf2d58b1e9fdb56672786ae40e265fdELSA-2021-9220
kernel-uek-5.4.17-2011.1.2.el7uek.x86_64.rpm8c721d1fd1890c060213034363ec2257ELSA-2021-9220
kernel-uek-debug-5.4.17-2011.1.2.el7uek.x86_64.rpm6f6196059dbf0d084c9a6aa50897bc61ELSA-2021-9220
kernel-uek-debug-devel-5.4.17-2011.1.2.el7uek.x86_64.rpm4259d23818bd5dccbfbbb9cbed97dc93ELSA-2021-9220
kernel-uek-devel-5.4.17-2011.1.2.el7uek.x86_64.rpm36041858cbb0bc131a28cd813b34a1e7ELSA-2021-9220
kernel-uek-doc-5.4.17-2011.1.2.el7uek.noarch.rpm826d7a84b0a2c1d05c4e4dd0627c5f02ELSA-2021-9220
kernel-uek-tools-5.4.17-2011.1.2.el7uek.x86_64.rpm244b8e204dce34b096f94fa5f911c669ELSA-2021-9220
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2011.1.2.el8uek.src.rpm19db72b24d9ce34bee5dbae2e1d9fa39-
kernel-uek-5.4.17-2011.1.2.el8uek.aarch64.rpm34182c7286db4e5044e90bf6da52a728-
kernel-uek-debug-5.4.17-2011.1.2.el8uek.aarch64.rpm4153d10900b848539db80a0f1f74a1ff-
kernel-uek-debug-devel-5.4.17-2011.1.2.el8uek.aarch64.rpm618e6a9aada118f54ad8a46677b4e76c-
kernel-uek-devel-5.4.17-2011.1.2.el8uek.aarch64.rpmdf08fa596ef82c2694c69028104b65e6-
kernel-uek-doc-5.4.17-2011.1.2.el8uek.noarch.rpmb71da55c27e82293b09586295a4a4637-
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2011.1.2.el8uek.src.rpm19db72b24d9ce34bee5dbae2e1d9fa39-
kernel-uek-5.4.17-2011.1.2.el8uek.x86_64.rpm254e487abd79034cec84182eadd2faa9-
kernel-uek-debug-5.4.17-2011.1.2.el8uek.x86_64.rpmd158b3e9773cf75ae8f479915fb1b016-
kernel-uek-debug-devel-5.4.17-2011.1.2.el8uek.x86_64.rpmf3afb0751af91c05847ad804d62d6d2b-
kernel-uek-devel-5.4.17-2011.1.2.el8uek.x86_64.rpm9c56545f007ca657d06ac263eb5a967d-
kernel-uek-doc-5.4.17-2011.1.2.el8uek.noarch.rpmb71da55c27e82293b09586295a4a4637-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete