ELSA-2020-5844

ELSA-2020-5844 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-09-11

Description


[4.14.35-2025.400.9]
- btrfs: merge btrfs_find_device and find_device (Anand Jain) [Orabug: 31867382] {CVE-2019-18885}
- sctp: implement memory accounting on tx path (Xin Long) [Orabug: 31867387] {CVE-2019-3874}
- Revert 'zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()' (Wade Mealing) [Orabug: 31867403] {CVE-2020-10781}
- x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS. (Anthony Steinhauser) [Orabug: 31867441] {CVE-2020-10767}
- md: get sysfs entry after redundancy attr group create (Junxiao Bi) [Orabug: 31867436]
- md: fix deadlock causing by sysfs_notify (Junxiao Bi) [Orabug: 31867436]
- random32: update the net random state on interrupt and activity (Willy Tarreau) [Orabug: 31867433] {CVE-2020-16166}
- vgacon: Fix for missing check in scrollback handling (Yunhai Zhang) [Orabug: 31867431] {CVE-2020-14331} {CVE-2020-14331}
- Reverts 'rds: avoid unnecessary cong_update in loop transport' (Iraimani Pavadai) [Orabug: 31867423]
- net/mlx5e: Poll event queue upon TX timeout before performing full channels recovery (Eran Ben Elisha) [Orabug: 31867421]
- net/rds: Incorrect pointer used in rds_getname() (Ka-Cheong Poon) [Orabug: 31867418]
- nfsd: apply umask on fs without ACL support (J. Bruce Fields) [Orabug: 31867417] {CVE-2020-24394}
- RDMA/mlx5: Fix Shared PD prefetch of ODP memory region (Mark Haywood) [Orabug: 31867413]
- rename kABI whitelists to lockedlists (Dan Duval) [Orabug: 31867411]

[4.14.35-2025.400.8]
- rds: Test parameter in rds_ib_recv_cache_put (Hans Westgaard Ry) [Orabug: 31737041]
- net/rds: rds_ib_remove_one() needs to wait (Ka-Cheong Poon) [Orabug: 31777364]
- RDMA/cm: Fix missing RDMA_CM_EVENT_REJECTED event after receiving REJ message (Leon Romanovsky) [Orabug: 31784658]
- RDMA/cm: Protect access to remote_sidr_table (Maor Gottlieb) [Orabug: 31784891]
- tcp: add sanity tests in tcp_add_backlog() (Eric Dumazet) [Orabug: 31780103]



Related CVEs


CVE-2020-10767
CVE-2019-18885
CVE-2020-24394
CVE-2020-10781
CVE-2020-14331
CVE-2020-16166
CVE-2019-3874

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-2025.400.9.el7uek.src.rpmf6dcea48e8e6b7c40abefe0950287b8cf52138effb92d14b87bb84a110a91945ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-2025.400.9.el7uek.aarch64.rpmea259858ee567ad76bfc509c49a5f75c68fa5acc5e7e346535c3a504a251a3f7ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-4.14.35-2025.400.9.el7uek.aarch64.rpm79ebb196ba504011e4be4d2ddab494e0920ffacff40df3469ddfb81cecb52251ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-devel-4.14.35-2025.400.9.el7uek.aarch64.rpme284f3eeb4956084310cb7f2ca1a0405408afb7c07cfa1b9c8a1cf513ad43149ELSA-2025-20190ol7_aarch64_latest
kernel-uek-devel-4.14.35-2025.400.9.el7uek.aarch64.rpm89a448399ed7d5030a5dfe5f108219c362e2d8f93c7d7f91455f1814787bd22eELSA-2025-20190ol7_aarch64_latest
kernel-uek-headers-4.14.35-2025.400.9.el7uek.aarch64.rpm403104942ecd9d92f47e5427c1e39e7d6f83a758565648e6975aca8fa9650a3cELBA-2025-20014ol7_aarch64_latest
kernel-uek-tools-4.14.35-2025.400.9.el7uek.aarch64.rpmf4a8e79419a4975d310eb77630012927b43b57949892523d891b7f1f3b72dabcELSA-2025-20190ol7_aarch64_latest
kernel-uek-tools-libs-4.14.35-2025.400.9.el7uek.aarch64.rpme8d81dcb7731d7f4a99651cc58cff67d6f56fe8a109e48bb52dfefde64384a8aELSA-2025-20019ol7_aarch64_latest
kernel-uek-tools-libs-devel-4.14.35-2025.400.9.el7uek.aarch64.rpm4488c29b4675e850197708cde1485694c48958a317fe25d4edf5c5c39b725307ELBA-2025-20014ol7_aarch64_latest
perf-4.14.35-2025.400.9.el7uek.aarch64.rpm6381e708fe174c6da6ae4c685a4932502d68a2d23d30da1f65a57d85ec203f60ELSA-2025-20019ol7_aarch64_latest
python-perf-4.14.35-2025.400.9.el7uek.aarch64.rpm0b5ffc6fd5c998f64f5cbbefe99a8883fb686edd91039f3adc2541a377ef128cELSA-2025-20019ol7_aarch64_latest
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-2025.400.9.el7uek.src.rpmf6dcea48e8e6b7c40abefe0950287b8cf52138effb92d14b87bb84a110a91945ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-4.14.35-2025.400.9.el7uek.src.rpmf6dcea48e8e6b7c40abefe0950287b8cf52138effb92d14b87bb84a110a91945ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-4.14.35-2025.400.9.el7uek.x86_64.rpmea52ac72265ca36f0882799b1a6bba7f345b531cf71c0db4aa50576b1e29f06fELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-4.14.35-2025.400.9.el7uek.x86_64.rpmea52ac72265ca36f0882799b1a6bba7f345b531cf71c0db4aa50576b1e29f06fELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-4.14.35-2025.400.9.el7uek.x86_64.rpmd5a21d0da7d56fa8ca01a15b21bf1e5ece700cd1bc407dbc96fa4e9b2983d897ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-debug-4.14.35-2025.400.9.el7uek.x86_64.rpmd5a21d0da7d56fa8ca01a15b21bf1e5ece700cd1bc407dbc96fa4e9b2983d897ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-devel-4.14.35-2025.400.9.el7uek.x86_64.rpmd2f6f9f4a9d4069f63e19def1abb7b526236a4cd9839d15338102f245fccef8fELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-debug-devel-4.14.35-2025.400.9.el7uek.x86_64.rpmd2f6f9f4a9d4069f63e19def1abb7b526236a4cd9839d15338102f245fccef8fELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-devel-4.14.35-2025.400.9.el7uek.x86_64.rpm48b9f0328f4a597cb190524a83418204dc4cf5ae6dc91565ac78488ba6ae50f1ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-devel-4.14.35-2025.400.9.el7uek.x86_64.rpm48b9f0328f4a597cb190524a83418204dc4cf5ae6dc91565ac78488ba6ae50f1ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-doc-4.14.35-2025.400.9.el7uek.noarch.rpmf30289fc0c3f65d606504c16b5035e3924c2a2530d02ab083fee7227f315cf3cELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-doc-4.14.35-2025.400.9.el7uek.noarch.rpmf30289fc0c3f65d606504c16b5035e3924c2a2530d02ab083fee7227f315cf3cELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-tools-4.14.35-2025.400.9.el7uek.x86_64.rpm797d8304e889e182c083a1acdbe9ad38cad80c80031e158928feb94c44bdbdbeELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-tools-4.14.35-2025.400.9.el7uek.x86_64.rpm797d8304e889e182c083a1acdbe9ad38cad80c80031e158928feb94c44bdbdbeELSA-2025-20190ol7_x86_64_UEKR5_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete