ELSA-2020-5844

ELSA-2020-5844 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-09-11

Description


[4.14.35-2025.400.9]
- btrfs: merge btrfs_find_device and find_device (Anand Jain) [Orabug: 31867382] {CVE-2019-18885}
- sctp: implement memory accounting on tx path (Xin Long) [Orabug: 31867387] {CVE-2019-3874}
- Revert 'zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()' (Wade Mealing) [Orabug: 31867403] {CVE-2020-10781}
- x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS. (Anthony Steinhauser) [Orabug: 31867441] {CVE-2020-10767}
- md: get sysfs entry after redundancy attr group create (Junxiao Bi) [Orabug: 31867436]
- md: fix deadlock causing by sysfs_notify (Junxiao Bi) [Orabug: 31867436]
- random32: update the net random state on interrupt and activity (Willy Tarreau) [Orabug: 31867433] {CVE-2020-16166}
- vgacon: Fix for missing check in scrollback handling (Yunhai Zhang) [Orabug: 31867431] {CVE-2020-14331} {CVE-2020-14331}
- Reverts 'rds: avoid unnecessary cong_update in loop transport' (Iraimani Pavadai) [Orabug: 31867423]
- net/mlx5e: Poll event queue upon TX timeout before performing full channels recovery (Eran Ben Elisha) [Orabug: 31867421]
- net/rds: Incorrect pointer used in rds_getname() (Ka-Cheong Poon) [Orabug: 31867418]
- nfsd: apply umask on fs without ACL support (J. Bruce Fields) [Orabug: 31867417] {CVE-2020-24394}
- RDMA/mlx5: Fix Shared PD prefetch of ODP memory region (Mark Haywood) [Orabug: 31867413]
- rename kABI whitelists to lockedlists (Dan Duval) [Orabug: 31867411]

[4.14.35-2025.400.8]
- rds: Test parameter in rds_ib_recv_cache_put (Hans Westgaard Ry) [Orabug: 31737041]
- net/rds: rds_ib_remove_one() needs to wait (Ka-Cheong Poon) [Orabug: 31777364]
- RDMA/cm: Fix missing RDMA_CM_EVENT_REJECTED event after receiving REJ message (Leon Romanovsky) [Orabug: 31784658]
- RDMA/cm: Protect access to remote_sidr_table (Maor Gottlieb) [Orabug: 31784891]
- tcp: add sanity tests in tcp_add_backlog() (Eric Dumazet) [Orabug: 31780103]



Related CVEs


CVE-2020-10767
CVE-2019-18885
CVE-2020-24394
CVE-2020-10781
CVE-2020-14331
CVE-2020-16166
CVE-2019-3874

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-2025.400.9.el7uek.src.rpmf59d1b982ac0276a735f39da18eb400dELSA-2020-5884
kernel-uek-4.14.35-2025.400.9.el7uek.aarch64.rpm49f52f6cd9fb73fad21c382a35014850ELSA-2020-5884
kernel-uek-debug-4.14.35-2025.400.9.el7uek.aarch64.rpmfdea0efc27b8fa7b2d710b6e2612d1b1ELSA-2020-5884
kernel-uek-debug-devel-4.14.35-2025.400.9.el7uek.aarch64.rpm87cb504c1a39faefc8d6c62794d31cf3ELSA-2020-5884
kernel-uek-devel-4.14.35-2025.400.9.el7uek.aarch64.rpmaa06c302c3537cc9326381aa7f4d5b21ELSA-2020-5884
kernel-uek-headers-4.14.35-2025.400.9.el7uek.aarch64.rpm2557ca9fb3e59580900e7b0e1215208fELSA-2020-5885
kernel-uek-tools-4.14.35-2025.400.9.el7uek.aarch64.rpm211a41fdd76908aa19d3452ac7043ccbELSA-2020-5884
kernel-uek-tools-libs-4.14.35-2025.400.9.el7uek.aarch64.rpm8903cafec8f44e14f59b4b28fc746b79ELSA-2020-5884
kernel-uek-tools-libs-devel-4.14.35-2025.400.9.el7uek.aarch64.rpmff0aba94e578753c72f3cd3f8520fbc6ELSA-2020-5885
perf-4.14.35-2025.400.9.el7uek.aarch64.rpm976325255dbcd719be1fe0f9b9214746ELSA-2020-5884
python-perf-4.14.35-2025.400.9.el7uek.aarch64.rpm8c34ffbc507e9aa5a481d09981e9b77cELSA-2020-5884
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-2025.400.9.el7uek.src.rpmf59d1b982ac0276a735f39da18eb400dELSA-2020-5884
kernel-uek-4.14.35-2025.400.9.el7uek.x86_64.rpm6bf3bb2f3b1cb1e0bb8522914890aea8ELSA-2020-5884
kernel-uek-debug-4.14.35-2025.400.9.el7uek.x86_64.rpm225ab5d10ac2161525ef5e86b9127c3cELSA-2020-5884
kernel-uek-debug-devel-4.14.35-2025.400.9.el7uek.x86_64.rpmf30bd4c955899121fe764e720af677e4ELSA-2020-5884
kernel-uek-devel-4.14.35-2025.400.9.el7uek.x86_64.rpm423f138a013e98a50065abe865b554bdELSA-2020-5884
kernel-uek-doc-4.14.35-2025.400.9.el7uek.noarch.rpm03b41fe57c6b56958c903b618dbdc5d8ELSA-2020-5884
kernel-uek-tools-4.14.35-2025.400.9.el7uek.x86_64.rpmfe1f9f83196b0dd27a98bee69b042d51ELSA-2020-5884



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete