[ELSA-2020-3010] kernel security, bug fix, and enhancement update

Severity Important
Affected Packages 20
CVEs 9

[4.18.0-193.13.2_2.OL8]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]

[4.18.0-193.13.2_2]
- Rebuild to get kernel image properly signed (Bruno Meneguele)

[4.18.0-193.13.1_2]
- [x86] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (Lenny Szubowicz) [1846180 1824005]

[4.18.0-193.12.1_2]
- [net] openvswitch: simplify the ovs_dp_cmd_new (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: fix possible memleak on destroy flow-table (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: add likely in flow_lookup (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: simplify the flow_hash (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: optimize flow-mask looking up (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: optimize flow mask cache hash collision (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: shrink the mask array if necessary (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: convert mask list in mask array (Eelco Chaudron) [1851235 1819202]
- [net] openvswitch: add flow-mask cache for performance (Eelco Chaudron) [1851235 1819202]
- [net] netfilter: nf_tables: use-after-free in dynamic operations (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: add missing ->release_ops() in error path of newrule() (Phil Sutter) [1845164 1757933]
- [net] netfilter: nft_compat: use .release_ops and remove list of extension (Phil Sutter) [1845164 1757933]
- [vfio] vfio/pci: Fix SR-IOV VF handling with MMIO blocking (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
- [pci] PCI: pciehp: Fix MSI interrupt race (Myron Stowe) [1852045 1779610]
- [kernel] smp: Allow smp_call_function_single_async() to insert locked csd (Peter Xu) [1851406 1830014]
- [x86] kvm: Clean up host's steal time structure (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
- [x86] kvm: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
- [virt] x86/kvm: Cache gfn to pfn translation (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
- [virt] x86/kvm: Introduce kvm_(un)map_gfn() (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
- [x86] kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (Jon Maloy) [1795128 1813987] {CVE-2019-3016}

[4.18.0-193.11.1_2]
- [net] netfilter: conntrack: fix infinite loop on rmmod (Florian Westphal) [1851005 1832381]
- [net] netfilter: conntrack: allow insertion of clashing entries (Florian Westphal) [1851003 1821404]
- [net] netfilter: conntrack: split resolve_clash function (Florian Westphal) [1851003 1821404]
- [net] netfilter: conntrack: place confirm-bit setting in a helper (Florian Westphal) [1851003 1821404]
- [net] netfilter: never get/set skb->tstamp (Florian Westphal) [1851003 1821404]
- [net] netfilter: conntrack: remove two args from resolve_clash (Florian Westphal) [1851003 1821404]
- [net] netfilter: conntrack: tell compiler to not inline nf_ct_resolve_clash (Florian Westphal) [1851003 1821404]
- [x86] mm: Fix mremap not considering huge pmd devmap (Rafael Aquini) [1843440 1843441] {CVE-2020-10757}
- [x86] x86/vector: Remove warning on managed interrupt migration (Peter Xu) [1848545 1812331]
- [s390] s390/cio: fix virtio-ccw DMA without PV (Philipp Rudo) [1842620 1814787]

[4.18.0-193.10.1_2]
- [misc] dma-mapping: zero memory returned from dma_alloc_* (Philipp Rudo) [1847453 1788928]
- [nvme] nvme-multipath: fix crash in nvme_mpath_clear_ctrl_paths (Gopal Tiwari) [1846405 1781927]
- [net] netfilter: nf_tables: fix infinite loop when expr is not available (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: autoload modules from the abort path (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: remove WARN and add NLA_STRING upper limits (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: store transaction list locally while requesting module (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: use-after-free in failing rule with bound set (Phil Sutter) [1845164 1757933]
- [net] netfilter: nft_meta: skip EAGAIN if nft_meta_bridge is not a module (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: force module load in case select_ops() returns -EAGAIN (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: add nft_expr_type_request_module() (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: bogus EBUSY in helper removal from transaction (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: fix set double-free in abort path (Phil Sutter) [1845164 1757933]
- [net] netfilter: nft_compat: don't use refcount_inc on newly allocated entry (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: unbind set in rule from commit path (Phil Sutter) [1845164 1757933]
- [net] netfilter: nft_compat: destroy function must not have side effects (Phil Sutter) [1845164 1757933]
- [net] netfilter: nft_compat: make lists per netns (Phil Sutter) [1845164 1757933]
- [net] netfilter: nft_compat: use refcnt_t type for nft_xt reference count (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: fix suspicious RCU usage in nft_chain_stats_replace() (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: asynchronous release (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: split set destruction in deactivate and destroy phase (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: flow event notifier must use transaction mutex (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: use dedicated mutex to guard transactions (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: avoid global info storage (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: take module reference when starting a batch (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: make valid_genid callback mandatory (Phil Sutter) [1845164 1757933]
- [net] netfilter: nf_tables: add and use helper for module autoload (Phil Sutter) [1845164 1757933]
- [net] netfilter: nat: never update the UDP checksum when it's 0 (Guillaume Nault) [1847128 1794714]
- [x86] x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches (Waiman Long) [1847395 1847396] {CVE-2020-10768}
- [x86] x86/speculation: Prevent rogue cross-process SSBD shutdown (Waiman Long) [1847357 1847358] {CVE-2020-10766}
- [x86] x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS (Waiman Long) [1847378 1847379] {CVE-2020-10767}
- [x86] x86/speculation: Add support for STIBP always-on preferred mode (Waiman Long) [1847378 1847379] {CVE-2020-10767}
- [x86] x86/speculation: Change misspelled STIPB to STIBP (Waiman Long) [1847378 1847379] {CVE-2020-10767}
- [powerpc] powerpc/pseries/ddw: Extend upper limit for huge DMA window for persistent memory (Steve Best) [1842406 1817596]

[4.18.0-193.9.1_2]
- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Jarod Wilson) [1844073 1844031] {CVE-2020-12654}
- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Jarod Wilson) [1844049 1844039] {CVE-2020-12653}
- [netdrv] net/mlx5: FPGA, support network cards with standalone FPGA (Alaa Hleihel) [1843544 1789380]
- [mm] hugetlbfs: don't retry when pool page allocations start to fail (Rafael Aquini) [1835789 1727288]
- [mm] mm, compaction: raise compaction priority after it withdrawns (Rafael Aquini) [1835789 1727288]
- [mm] mm, reclaim: cleanup should_continue_reclaim() (Rafael Aquini) [1835789 1727288]
- [mm] mm, reclaim: make should_continue_reclaim perform dryrun detection (Rafael Aquini) [1835789 1727288]
- [kernel] exit: panic before exit_mm() on global init exit (Oleg Nesterov) [1821378 1808944]
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}

[4.18.0-193.8.1_2]
- [vfio] vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
- [vfio] vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
- [vfio] vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
- [vfio] vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
- [vfio] vfio/pci: call irq_bypass_unregister_producer() before freeing irq (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
- [vfio] vfio_pci: Enable memory accesses before calling pci_map_rom (Alex Williamson) [1837309 1837310] {CVE-2020-12888}

[4.18.0-193.7.1_2]
- [sound] ALSA: timer: Fix incorrectly assigned timer instance (Jaroslav Kysela) [1821714 1798468] {CVE-2019-19807}
- [netdrv] ibmvnic: Do not process device remove during device reset (Steve Best) [1836229 1813223]
- [net] ipv4: really enforce backoff for redirects (Paolo Abeni) [1836302 1834184]

Package Affected Version
pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.2 < 4.18.0-193.13.2.el8_2
ID
ELSA-2020-3010
Severity
important
URL
https://linux.oracle.com/errata/ELSA-2020-3010.html
Published
2020-07-24T00:00:00
(4 years ago)
Modified
2020-07-24T00:00:00
(4 years ago)
Rights
Copyright 2020 Oracle, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.2 oraclelinux python3-perf < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.2 oraclelinux perf < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.2 oraclelinux kernel < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.2 oraclelinux kernel-tools < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.2 oraclelinux kernel-tools-libs < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.2 oraclelinux kernel-tools-libs-devel < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.2 oraclelinux kernel-modules < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.2 oraclelinux kernel-modules-extra < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.2 oraclelinux kernel-headers < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.2 oraclelinux kernel-doc < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.2 oraclelinux kernel-devel < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.2 oraclelinux kernel-debug < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.2 oraclelinux kernel-debug-modules < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.2 oraclelinux kernel-debug-modules-extra < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.2 oraclelinux kernel-debug-devel < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.2 oraclelinux kernel-debug-core < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.2 oraclelinux kernel-cross-headers < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.2 oraclelinux kernel-core < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-8.2 oraclelinux kernel-abi-whitelists < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
Affected pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.2 oraclelinux bpftool < 4.18.0-193.13.2.el8_2 oraclelinux-8.2
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...