[ELSA-2020-5508] Unbreakable Enterprise kernel security update
[4.1.12-124.35.1]
- ixgbe: protect TX timestamping from API misuse (Manjunath Patil) [Orabug: 30275491]
- block: init flush rq ref count to 1 (Josef Bacik) [Orabug: 30360559]
- block: fix null pointer dereference in blk_mq_rq_timed_out() (Yufen Yu) [Orabug: 30360559]
- blk-mq: Remove generation seqeunce (Keith Busch) [Orabug: 30360559]
- scsi: libsas: delete sas port if expander discover failed (Jason Yan) [Orabug: 30580687] {CVE-2019-15807}
- scsi: qla2xxx: fix a potential NULL pointer dereference (Allen Pais) [Orabug: 30618784] {CVE-2019-16233}
- printk: Default console logging level should be set to 4 (Boris Ostrovsky) [Orabug: 30657070]
[4.1.12-124.34.2]
- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (James Smart) [Orabug: 30569875]
- scsi: lpfc: Make PBDE optimizations configurable (James Smart) [Orabug: 30569875]
- scsi: lpfc: Update driver version to 11.4.0.8 and Copyright updates (Ketan Mukadam) [Orabug: 30569875]
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (James Smart) [Orabug: 30569875]
- scsi: lpfc: Correct race with abort on completion path (James Smart) [Orabug: 30569875]
- scsi: lpfc: update manufacturer attribute to reflect Broadcom (James Smart) [Orabug: 30569875] [Orabug: 29212758]
- scsi: lpfc: Enable Management features for IF_TYPE=6 (James Smart) [Orabug: 30569875] [Orabug: 29212758]
- scsi: lpfc: Correct topology type reporting on G7 adapters (James Smart) [Orabug: 30569875] [Orabug: 29212758]
- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (James Smart) [Orabug: 30569875]
- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (James Smart) [Orabug: 30569875]
- scsi: lpfc: Enhance log messages when reporting CQE errors (James Smart) [Orabug: 30569875]
- scsi: lpfc: Fix frequency of Release WQE CQEs (James Smart) [Orabug: 30569875]
- scsi: lpfc: Code cleanup for 128byte wqe data type (James Smart) [Orabug: 30569875]
- scsi: lpfc: use __raw_writeX on DPP copies (James Smart) [Orabug: 30569875]
- scsi: lpfc: Add embedded data pointers for enhanced performance (James Smart) [Orabug: 30569875]
- scsi: lpfc: Enable fw download on if_type=6 devices (James Smart) [Orabug: 30569875]
- scsi: lpfc: Add if_type=6 support for cycling valid bits (James Smart) [Orabug: 30569875]
- scsi: lpfc: Add 64G link speed support (James Smart) [Orabug: 30569875]
- scsi: lpfc: Add PCI Ids for if_type=6 hardware (James Smart) [Orabug: 30569875]
- scsi: lpfc: Add push-to-adapter support to sli4 (James Smart) [Orabug: 30569875]
- scsi: lpfc: Add SLI-4 if_type=6 support to the code base (James Smart) [Orabug: 30569875]
- scsi: lpfc: Rework sli4 doorbell infrastructure (James Smart) [Orabug: 30569875]
- scsi: lpfc: Rework lpfc to allow different sli4 cq and eq handlers (James Smart) [Orabug: 30569875]
- x86/bugs: use check_bugs instead of microcode_late_select_mitigation (Mihai Carabas) [Orabug: 30332499]
- x86/bugs: spec_ctrl_mutex taken in stop_machine context (Mihai Carabas) [Orabug: 30332499]
- x86/microcode: moved cpu feature late eval to stop_machine (Mihai Carabas) [Orabug: 30332499]
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (Andy Lutomirski) [Orabug: 30332499]
- x86/microcode/intel: Check microcode revision before updating sibling threads (Ashok Raj) [Orabug: 30332499]
- tracing: Fix possible double free on failure of allocating trace buffer (Steven Rostedt (VMware)) [Orabug: 30633873] {CVE-2017-18595}
- ID
- ELSA-2020-5508
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2020-5508.html
- Published
-
2020-01-09T00:00:00
(4 years ago) - Modified
-
2020-01-09T00:00:00
(4 years ago) - Rights
- Copyright 2020 Oracle, Inc.
- Other Advisories
-
- ALSA-2020:4431
- ELSA-2020-2082
- ELSA-2020-4060
- ELSA-2020-5511
- ELSA-2020-5512
- openSUSE-SU-2019:2307-1
- openSUSE-SU-2019:2308-1
- openSUSE-SU-2019:2444-1
- openSUSE-SU-2019:2503-1
- RHSA-2020:2082
- RHSA-2020:2085
- RHSA-2020:4060
- RHSA-2020:4062
- RHSA-2020:4431
- RHSA-2020:4609
- SSA:2020-086-01
- SUSE-SU-2019:2648-1
- SUSE-SU-2019:2651-1
- SUSE-SU-2019:2658-1
- SUSE-SU-2019:2706-1
- SUSE-SU-2019:2710-1
- SUSE-SU-2019:2756-1
- SUSE-SU-2019:2879-1
- SUSE-SU-2019:2946-1
- SUSE-SU-2019:2947-1
- SUSE-SU-2019:2948-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:2951-1
- SUSE-SU-2019:2952-1
- SUSE-SU-2019:2953-1
- SUSE-SU-2019:2984-1
- SUSE-SU-2019:3200-1
- SUSE-SU-2019:3294-1
- SUSE-SU-2019:3295-1
- SUSE-SU-2020:0093-1
- USN-4226-1
- USN-4227-1
- USN-4227-2
- USN-4346-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2020-5508 | https://linux.oracle.com/errata/ELSA-2020-5508.html | |
CVE | CVE-2019-15807 | https://linux.oracle.com/cve/CVE-2019-15807.html | |
CVE | CVE-2019-16233 | https://linux.oracle.com/cve/CVE-2019-16233.html | |
CVE | CVE-2017-18595 | https://linux.oracle.com/cve/CVE-2017-18595.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.35.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.35.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.35.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.35.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.35.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.35.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.35.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.35.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.35.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.35.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.35.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.35.1.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |