ELSA-2020-5732

ELSA-2020-5732 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-06-18

Description


[4.14.35-1902.303.5.3]
- rds: Deregister all FRWR mr with free_mr (Hans Westgaard Ry) [Orabug: 31476202]
- Revert rds: Do not cancel RDMAs that have been posted to the HCA (Gerd Rausch) [Orabug: 31475329]
- Revert rds: Introduce rds_conn_to_path helper (Gerd Rausch) [Orabug: 31475329]
- Revert rds: Three cancel fixes (Gerd Rausch) [Orabug: 31475318]

[4.14.35-1902.303.5.2]
- rds: Three cancel fixes (Hakon Bugge) [Orabug: 31463014]

[4.14.35-1902.303.5.1]
- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}

[4.14.35-1902.303.5]
- net/mlx5: Decrease default mr cache size (Artemy Kovalyov) [Orabug: 31446379]


Related CVEs


CVE-2020-0543

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1902.303.5.3.el7uek.src.rpm9183e90c3a7563a1f41e32d0da0e1808-
kernel-uek-4.14.35-1902.303.5.3.el7uek.aarch64.rpmb10425e1d117d354add1b242b4c8f700-
kernel-uek-debug-4.14.35-1902.303.5.3.el7uek.aarch64.rpm08c701991c2427fb24999e04904d3c78-
kernel-uek-debug-devel-4.14.35-1902.303.5.3.el7uek.aarch64.rpmdc0a18b4a298dea6d736ab01e9a3ffcd-
kernel-uek-devel-4.14.35-1902.303.5.3.el7uek.aarch64.rpm9f01553ecd149966e5245148eb0bd4a8-
kernel-uek-headers-4.14.35-1902.303.5.3.el7uek.aarch64.rpmbf597914eaeadeedc1fa4514380589ad-
kernel-uek-tools-4.14.35-1902.303.5.3.el7uek.aarch64.rpm7aa4d35790655ecf20dc91ad3fa8b354-
kernel-uek-tools-libs-4.14.35-1902.303.5.3.el7uek.aarch64.rpm51335f9588ce00e3b13c8c5b4db0e244-
kernel-uek-tools-libs-devel-4.14.35-1902.303.5.3.el7uek.aarch64.rpm2da39b8fe129c671f5e95869996e4ab9-
perf-4.14.35-1902.303.5.3.el7uek.aarch64.rpm6c1252c1d90ae38f7b8271f65da9080e-
python-perf-4.14.35-1902.303.5.3.el7uek.aarch64.rpmd0011b03125060fd43dc12c6b2b5837e-
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1902.303.5.3.el7uek.src.rpm9183e90c3a7563a1f41e32d0da0e1808-
kernel-uek-4.14.35-1902.303.5.3.el7uek.x86_64.rpmfb3bf8ed036d0b765ccf91543e97c909-
kernel-uek-debug-4.14.35-1902.303.5.3.el7uek.x86_64.rpmf77f6277953fdd27fafe25a064cb74f3-
kernel-uek-debug-devel-4.14.35-1902.303.5.3.el7uek.x86_64.rpm7cfb382ed95712c32304ee935fa0bb66-
kernel-uek-devel-4.14.35-1902.303.5.3.el7uek.x86_64.rpm88067e32b1743e1a3cc5bd6385e15d5f-
kernel-uek-doc-4.14.35-1902.303.5.3.el7uek.noarch.rpm3801f245a7f2cb0ee263250d0528413c-
kernel-uek-tools-4.14.35-1902.303.5.3.el7uek.x86_64.rpm46552d5e9ecadf558de6a44e969fadf4-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete