Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2020-08-06 |
[4.1.12-124.41.4]
- uek-rpm: Add OL6 shim conflict for new signing key (Eric Snowberg) [Orabug: 31688239]
- Revert 'certs: Add Oracle's new X509 cert into the kernel keyring' (Eric Snowberg) [Orabug: 31688223]
- blk-mq: don't overwrite rq->mq_ctx (Jens Axboe) [Orabug: 31457304]
- blk-mq: mark ctx as pending at batch in flush plug path (Ming Lei) [Orabug: 31457304]
[4.1.12-124.41.3]
- scsi: qla2xxx: Fix stuck session in GNL (Quinn Tran) [Orabug: 31561461]
- scsi: qla2xxx: Serialize session free in qlt_free_session_done (Quinn Tran) [Orabug: 31561461]
- scsi: qla2xxx: v2: Change abort wait_loop from msleep to wait_event_timeout (Giridhar Malavali) [Orabug: 26932683]
- scsi: qla2xxx: v2: Move ABTS code behind qpair (Quinn Tran) [Orabug: 31517449]
- ocfs2: change slot number type s16 to u16 (Junxiao Bi) [Orabug: 31027042]
- ocfs2: fix value of OCFS2_INVALID_SLOT (Junxiao Bi) [Orabug: 31027042]
- ocfs2: fix panic on nfs server over ocfs2 (Junxiao Bi) [Orabug: 31027042]
- ocfs2: load global_inode_alloc (Junxiao Bi) [Orabug: 31027042]
- ocfs2: avoid inode removal while nfsd is accessing it (Junxiao Bi) [Orabug: 31027042]
- block_dev: don't test bdev->bd_contains when it is not stable (NeilBrown) [Orabug: 31554143]
- KVM: x86: Remove spurious semicolon (Joao Martins) [Orabug: 31584727]
[4.1.12-124.41.2]
- media: rc: prevent memory leak in cx23888_ir_probe (Navid Emamdoost) [Orabug: 31351672] {CVE-2019-19054}
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (Alex Williamson) [Orabug: 31439671] {CVE-2020-12888}
- vfio/pci: Mask buggy SR-IOV VF INTx support (Alex Williamson) [Orabug: 31439671] {CVE-2020-12888}
- vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [Orabug: 31439671] {CVE-2020-12888} {CVE-2020-12888}
- vfio/pci: Pull BAR mapping setup from read-write path (Alex Williamson) [Orabug: 31439671] {CVE-2020-12888}
- vfio_pci: Enable memory accesses before calling pci_map_rom (Eric Auger) [Orabug: 31439671] {CVE-2020-12888}
- vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [Orabug: 31439671] {CVE-2020-12888}
- vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [Orabug: 31439671] {CVE-2020-12888}
- mm: bring in additional flag for fixup_user_fault to signal unlock (Dominik Dingel) [Orabug: 31439671] {CVE-2020-12888}
- vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Sean Christopherson) [Orabug: 31439671] {CVE-2020-12888}
- x86/mitigations: reset default value for srbds_mitigation (Mihai Carabas) [Orabug: 31514993]
- x86/cpu: clear X86_BUG_SRBDS before late loading (Mihai Carabas) [Orabug: 31514993]
- x86/mitigations: update MSRs on all CPUs for SRBDS (Mihai Carabas) [Orabug: 31514993]
- Revert 'x86/efi: Request desired alignment via the PE/COFF headers' (Matt Fleming) [Orabug: 31602576]
[4.1.12-124.41.1]
- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (Richard Palethorpe) [Orabug: 31516085] {CVE-2020-14416}
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout() (himanshu.madhani@cavium.com) [Orabug: 31530589]
- scsi: qla2xxx: Fix NULL pointer access for fcport structure (Quinn Tran) [Orabug: 31530589]
CVE-2020-12888 |
CVE-2020-14416 |
CVE-2019-19054 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-124.41.4.el6uek.src.rpm | c23c2260f1a7720a2312d727460a094b85d88d484ccb9884f5136da3864bf2f4 | ELSA-2025-20007 | ol6_x86_64_UEKR4_archive |
kernel-uek-4.1.12-124.41.4.el6uek.x86_64.rpm | 23f41e844ce2085155e4de1150da8257a91aadc22d5c1e754037804770de0592 | ELSA-2025-20007 | ol6_x86_64_UEKR4_archive | |
kernel-uek-debug-4.1.12-124.41.4.el6uek.x86_64.rpm | 9c2989414c744d7323059aa6ccbb53c87018316dd8f98037544715664a2a42e0 | ELSA-2025-20007 | ol6_x86_64_UEKR4_archive | |
kernel-uek-debug-devel-4.1.12-124.41.4.el6uek.x86_64.rpm | b69dd4e1a26499a3744484c2d6b2afcddc4fc0fe3974890614b1fb575ed7b93f | ELSA-2025-20007 | ol6_x86_64_UEKR4_archive | |
kernel-uek-devel-4.1.12-124.41.4.el6uek.x86_64.rpm | 7c22aab4fdd25ea7f304fbf282704d9868c03b43471ca38254c00d4acd530eb7 | ELSA-2025-20007 | ol6_x86_64_UEKR4_archive | |
kernel-uek-doc-4.1.12-124.41.4.el6uek.noarch.rpm | 092b3fcb2670006eb3628e7c1917179dd5ec389d81ae7459d71a970e851ea38d | ELSA-2025-20007 | ol6_x86_64_UEKR4_archive | |
kernel-uek-firmware-4.1.12-124.41.4.el6uek.noarch.rpm | f61c6cecc632786f10970f96cdc0979846c83ed8b3d2d8ed86ba653370b5192a | ELSA-2025-20007 | ol6_x86_64_UEKR4_archive | |
Oracle Linux 7 (x86_64) | kernel-uek-4.1.12-124.41.4.el7uek.src.rpm | 08e669238aab2a2a1fd00a779a86e6e94e41af6e4785575b41a43af67ddd1896 | ELSA-2025-20190 | ol7_x86_64_UEKR4_archive |
kernel-uek-4.1.12-124.41.4.el7uek.x86_64.rpm | 022e9533868cdbf5d2a526f3d913ced6852a7ec2bc5379aac3a3c1beef355078 | ELSA-2025-20190 | ol7_x86_64_UEKR4_archive | |
kernel-uek-debug-4.1.12-124.41.4.el7uek.x86_64.rpm | 22a4310992af1dd3c4379d1e86bf6d78871ef6bd47d04269cc684163453a712e | ELSA-2025-20190 | ol7_x86_64_UEKR4_archive | |
kernel-uek-debug-devel-4.1.12-124.41.4.el7uek.x86_64.rpm | db9cb7816c2b856697a50907bc7a77c78a3e2def3c1cef676ec8ad45449440de | ELSA-2025-20190 | ol7_x86_64_UEKR4_archive | |
kernel-uek-devel-4.1.12-124.41.4.el7uek.x86_64.rpm | c11444a2fc7d54ca66ec718b075bb4d5eb28cd87404d20a81915e3153e405be0 | ELSA-2025-20190 | ol7_x86_64_UEKR4_archive | |
kernel-uek-doc-4.1.12-124.41.4.el7uek.noarch.rpm | f656aff480e12377b7445605c7b23c6146726520aeae585f175374c427553564 | ELSA-2025-20190 | ol7_x86_64_UEKR4_archive | |
kernel-uek-firmware-4.1.12-124.41.4.el7uek.noarch.rpm | 832ef950f87def23b324006fe61fcfb6eb4c4c8851f973f138e32bbe0bc77202 | ELSA-2025-20007 | ol7_x86_64_UEKR4_archive |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team