[ELSA-2020-5732] Unbreakable Enterprise kernel security update
[4.14.35-1902.303.5.3]
- rds: Deregister all FRWR mr with free_mr (Hans Westgaard Ry) [Orabug: 31476202]
- Revert rds: Do not cancel RDMAs that have been posted to the HCA (Gerd Rausch) [Orabug: 31475329]
- Revert rds: Introduce rds_conn_to_path helper (Gerd Rausch) [Orabug: 31475329]
- Revert rds: Three cancel fixes (Gerd Rausch) [Orabug: 31475318]
[4.14.35-1902.303.5.2]
- rds: Three cancel fixes (Hakon Bugge) [Orabug: 31463014]
[4.14.35-1902.303.5.1]
- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
[4.14.35-1902.303.5]
- net/mlx5: Decrease default mr cache size (Artemy Kovalyov) [Orabug: 31446379]
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/perf?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-tools?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-tools-libs?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-tools-libs-devel?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | < 4.14.35-1902.303.5.3.el7uek |
- ID
- ELSA-2020-5732
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2020-5732.html
- Published
-
2020-06-18T00:00:00
(4 years ago) - Modified
-
2020-06-18T00:00:00
(4 years ago) - Rights
- Copyright 2020 Oracle, Inc.
- Other Advisories
-
- ALAS-2020-1396
- ALAS-2020-1401
- ALAS2-2020-1444
- ALAS2-2020-1465
- ALPINE:CVE-2020-0543
- ALSA-2021:3027
- ASA-202006-10
- DSA-4698-1
- DSA-4699-1
- DSA-4701-1
- ELSA-2020-2431
- ELSA-2020-2432
- ELSA-2020-2433
- ELSA-2020-5714
- ELSA-2020-5715
- ELSA-2020-5722
- ELSA-2020-5750
- ELSA-2020-5755
- ELSA-2020-5756
- ELSA-2021-3027
- ELSA-2021-3028
- FEDORA-2020-11ddbfbdf0
- FEDORA-2020-1afbe7ba2d
- FEDORA-2020-3364913ace
- FEDORA-2020-e47d28bc2b
- FEDORA-2020-e8835a5f8e
- FREEBSD:FBCBA194-AC7D-11EA-8B5E-B42E99A1B9C3
- openSUSE-SU-2020:0791-1
- openSUSE-SU-2020:0801-1
- openSUSE-SU-2020:0818-1
- openSUSE-SU-2020:0965-1
- openSUSE-SU-2020:0985-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:2431
- RHSA-2020:2432
- RHSA-2020:2433
- RHSA-2021:3027
- RHSA-2021:3028
- SSA:2020-163-01
- SUSE-SU-2020:1587-1
- SUSE-SU-2020:1589-1
- SUSE-SU-2020:1595-1
- SUSE-SU-2020:1596-1
- SUSE-SU-2020:1597-1
- SUSE-SU-2020:1599-1
- SUSE-SU-2020:1600-1
- SUSE-SU-2020:1601-1
- SUSE-SU-2020:1602-1
- SUSE-SU-2020:1603-1
- SUSE-SU-2020:1604-1
- SUSE-SU-2020:1605-1
- SUSE-SU-2020:1609-1
- SUSE-SU-2020:1630-1
- SUSE-SU-2020:1632-1
- SUSE-SU-2020:1633-1
- SUSE-SU-2020:1634-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:1887-1
- SUSE-SU-2020:1889-1
- SUSE-SU-2020:1902-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2822-1
- SUSE-SU-2021:1497-1
- USN-4385-1
- USN-4387-1
- USN-4388-1
- USN-4389-1
- USN-4390-1
- USN-4391-1
- USN-4392-1
- USN-4393-1
- USN-5617-1
- XSA-320
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2020-5732 | https://linux.oracle.com/errata/ELSA-2020-5732.html | |
CVE | CVE-2020-0543 | https://linux.oracle.com/cve/CVE-2020-0543.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-7 | oraclelinux | python-perf | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-7 | oraclelinux | perf | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools-libs?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools-libs | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools-libs-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools-libs-devel | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-7 | oraclelinux | kernel-uek-headers | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.14.35-1902.303.5.3.el7uek | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |