[ELSA-2020-0339] kernel security and bug fix update
[4.18.0-147.5.1_1.OL8]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
[4.18.0-147.5.1_1]
- [powerpc] powerpc/shared: Use static key to detect shared processor (Phil Auld) [1781114 1767529]
- [powerpc] powerpc/vcpu: Assume dedicated processors as non-preempt (Phil Auld) [1781114 1767529]
[4.18.0-147.4.1_1]
- [block] blk-mq: apply normal plugging for HDD (Ming Lei) [1782181 1759380]
- [block] blk-mq: honor IO scheduler for multiqueue devices (Ming Lei) [1782181 1759380]
- [block] blk-mq: simplify blk_mq_make_request() (Ming Lei) [1782181 1759380]
- [block] blk-mq: remove blk_mq_put_ctx() (Ming Lei) [1782181 1759380]
- [x86] kvm: vmx: use MSR_IA32_TSX_CTRL to hard-disable TSX on guest that lack it (Paolo Bonzini) [1781660 1779553] {CVE-2019-19338}
- [x86] kvm: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality (Paolo Bonzini) [1781660 1779553] {CVE-2019-19338}
- [x86] kvm: x86: implement MSR_IA32_TSX_CTRL effect on CPUID (Paolo Bonzini) [1781660 1779553] {CVE-2019-19338}
- [x86] kvm: x86: do not modify masked bits of shared MSRs (Paolo Bonzini) [1781660 1779553] {CVE-2019-19338}
- [x86] kvm: x86: fix presentation of TSX feature in ARCH_CAPABILITIES (Paolo Bonzini) [1781660 1779553] {CVE-2019-19338}
- [x86] kvm/x86: Export MDS_NO=0 to guests when TSX is enabled (Paolo Bonzini) [1781660 1779553] {CVE-2019-19338}
- [fs] cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (Leif Sahlberg) [1778693 1765979]
- [fs] cifs: avoid using MID 0xFFFF (Leif Sahlberg) [1778693 1765979]
- [fs] cifs: Fix retry mid list corruption on reconnects (Leif Sahlberg) [1778693 1765979]
- [fs] smb3: fix unmount hang in open_shroot (Leif Sahlberg) [1781113 1757670]
- [fs] CIFS: fix deadlock in cached root handling (Leif Sahlberg) [1781113 1757670]
- [fs] Fix match_server check to allow for auto dialect negotiate (Leif Sahlberg) [1781113 1757670]
- [fs] SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write (Leif Sahlberg) [1781113 1757670]
- [fs] cifs: fix panic in smb2_reconnect (Leif Sahlberg) [1781113 1757670]
- [fs] cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() (Leif Sahlberg) [1781113 1757670]
- [fs] smb3: fix signing verification of large reads (Dave Wysochanski) [1781110 1753114]
- [scsi] scsi: lpfc: Fix port relogin failure due to GID_FT interaction (Dick Kennedy) [1781108 1733217]
- [fs] xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT (Bill O'Donnell) [1778692 1739607]
- [net] cfg80211: wext: avoid copying malformed SSIDs (Jarod Wilson) [1778633 1778634] {CVE-2019-17133}
- [block] blkcg: perpcu_ref init/exit should be done from blkg_alloc/free() (Ming Lei) [1777766 1741392]
- [fs] userfaultfd_release: always remove uffd flags and clear vm_userfaultfd_ctx (Alex Gladkov) [1777389 1749763] {CVE-2019-14898}
- [netdrv] mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings (Jarod Wilson) [1776618 1775484] {CVE-2019-14814 CVE-2019-14815 CVE-2019-14816}
- [netdrv] mwifiex: fix possible heap overflow in mwifiex_process_country_ie() (Jarod Wilson) [1776209 1776210] {CVE-2019-14895}
- [netdrv] mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame() (Jarod Wilson) [1776161 1776162] {CVE-2019-14901}
- [netdrv] rtlwifi: Fix potential overflow on P2P code (Jarod Wilson) [1775222 1775223] {CVE-2019-17666}
- [pci] hv: Avoid use of hv_pci_dev->pci_slot after freeing it (Mohammed Gamal) [1764635 1737569]
- ID
- ELSA-2020-0339
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2020-0339.html
- Published
-
2020-02-07T00:00:00
(4 years ago) - Modified
-
2020-02-07T00:00:00
(4 years ago) - Rights
- Copyright 2020 Oracle, Inc.
- Other Advisories
-
- ASA-201911-10
- ASA-201911-11
- ASA-201911-12
- ASA-201911-9
- ELSA-2020-0374
- ELSA-2020-0834
- ELSA-2020-1524
- ELSA-2020-5533
- ELSA-2020-5535
- ELSA-2020-5541
- ELSA-2020-5569
- ELSA-2020-5670
- ELSA-2020-5676
- ELSA-2020-5845
- ELSA-2020-5866
- ELSA-2021-9002
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-39e97683e8
- FEDORA-2019-41e28660ae
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-6a67ff8793
- FEDORA-2019-7a3fc17778
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-97380355ae
- FEDORA-2019-a570a92d5a
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-e3010166bd
- FEDORA-2020-203ffedeb5
- FEDORA-2020-227a4c0530
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-3cd64d683c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-e328697628
- FEDORA-2020-f884f9dd7d
- FEDORA-2020-fe00e12580
- MS:CVE-2019-19338
- openSUSE-SU-2019:2173-1
- openSUSE-SU-2019:2181-1
- openSUSE-SU-2019:2392-1
- openSUSE-SU-2019:2444-1
- openSUSE-SU-2019:2675-1
- openSUSE-SU-2020:0336-1
- RHSA-2020:0328
- RHSA-2020:0339
- RHSA-2020:0374
- RHSA-2020:0375
- RHSA-2020:0834
- RHSA-2020:0839
- RHSA-2020:1016
- RHSA-2020:1070
- RHSA-2020:1524
- SSA:2019-311-01
- SSA:2020-008-01
- SSA:2020-086-01
- SUSE-SU-2019:2412-1
- SUSE-SU-2019:2414-1
- SUSE-SU-2019:2424-1
- SUSE-SU-2019:2648-1
- SUSE-SU-2019:2651-1
- SUSE-SU-2019:2658-1
- SUSE-SU-2019:2738-1
- SUSE-SU-2019:2756-1
- SUSE-SU-2019:2879-1
- SUSE-SU-2019:2946-1
- SUSE-SU-2019:2947-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:2951-1
- SUSE-SU-2019:2952-1
- SUSE-SU-2019:2953-1
- SUSE-SU-2019:2984-1
- SUSE-SU-2019:3200-1
- SUSE-SU-2019:3289-1
- SUSE-SU-2019:3294-1
- SUSE-SU-2019:3295-1
- SUSE-SU-2019:3316-1
- SUSE-SU-2019:3317-1
- SUSE-SU-2019:3371-1
- SUSE-SU-2019:3372-1
- SUSE-SU-2019:3379-1
- SUSE-SU-2019:3381-1
- SUSE-SU-2019:3389-1
- SUSE-SU-2020:0093-1
- SUSE-SU-2020:0511-1
- SUSE-SU-2020:0560-1
- SUSE-SU-2020:0584-1
- SUSE-SU-2020:0599-1
- SUSE-SU-2020:0613-1
- SUSE-SU-2020:0667-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:2491-1
- SUSE-SU-2020:2492-1
- SUSE-SU-2020:2497-1
- SUSE-SU-2020:2498-1
- SUSE-SU-2020:2505-1
- SUSE-SU-2020:2506-1
- SUSE-SU-2020:2513-1
- SUSE-SU-2020:2526-1
- USN-4157-1
- USN-4157-2
- USN-4162-1
- USN-4162-2
- USN-4163-1
- USN-4163-2
- USN-4183-1
- USN-4184-1
- USN-4185-1
- USN-4186-1
- USN-4186-2
- USN-4225-1
- USN-4225-2
- USN-4226-1
- USN-4227-1
- USN-4227-2
- USN-4228-1
- USN-4228-2
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2020-0339 | https://linux.oracle.com/errata/ELSA-2020-0339.html | |
CVE | CVE-2019-14814 | https://linux.oracle.com/cve/CVE-2019-14814.html | |
CVE | CVE-2019-14816 | https://linux.oracle.com/cve/CVE-2019-14816.html | |
CVE | CVE-2019-14898 | https://linux.oracle.com/cve/CVE-2019-14898.html | |
CVE | CVE-2019-14895 | https://linux.oracle.com/cve/CVE-2019-14895.html | |
CVE | CVE-2019-17666 | https://linux.oracle.com/cve/CVE-2019-17666.html | |
CVE | CVE-2019-19338 | https://linux.oracle.com/cve/CVE-2019-19338.html | |
CVE | CVE-2019-14901 | https://linux.oracle.com/cve/CVE-2019-14901.html | |
CVE | CVE-2019-14815 | https://linux.oracle.com/cve/CVE-2019-14815.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.1 | oraclelinux | python3-perf | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.1 | oraclelinux | perf | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.1 | oraclelinux | kernel | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.1 | oraclelinux | kernel-tools | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.1 | oraclelinux | kernel-tools-libs | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.1 | oraclelinux | kernel-tools-libs-devel | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.1 | oraclelinux | kernel-modules | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.1 | oraclelinux | kernel-modules-extra | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.1 | oraclelinux | kernel-headers | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.1 | oraclelinux | kernel-doc | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.1 | oraclelinux | kernel-devel | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.1 | oraclelinux | kernel-debug | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.1 | oraclelinux | kernel-debug-modules | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.1 | oraclelinux | kernel-debug-modules-extra | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.1 | oraclelinux | kernel-debug-devel | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.1 | oraclelinux | kernel-debug-core | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.1 | oraclelinux | kernel-cross-headers | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.1 | oraclelinux | kernel-core | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-8.1 | oraclelinux | kernel-abi-whitelists | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 | ||
Affected | pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.1 | oraclelinux | bpftool | < 4.18.0-147.5.1.el8_1 | oraclelinux-8.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |