[ELSA-2020-5792] Unbreakable Enterprise kernel security update
Severity
Important
Affected Packages
14
CVEs
1
[5.4.17-2011.4.6.el8uek]
- Revert 'uek-rpm: Move grub boot menu update to posttrans stage.' (Somasundaram Krishnasamy) [Orabug: 31358097]
[5.4.17-2011.4.5.el8uek]
- IB/sa: Resolv use-after-free in ib_nl_make_request() (Divya Indi) [Orabug: 31631527]
- certs: Remove Oracle cert compiled into the kernel (Eric Snowberg) [Orabug: 31555595]
- acpi: disallow loading configfs acpi tables when locked down (Jason A. Donenfeld) [Orabug: 31642981]
- ID
- ELSA-2020-5792
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2020-5792.html
- Published
-
2020-07-29T00:00:00
(4 years ago) - Modified
-
2020-07-29T00:00:00
(4 years ago) - Rights
- Copyright 2020 Oracle, Inc.
- Other Advisories
-
- ELSA-2020-3218
- MS:CVE-2020-15780
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2020:1236-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:3218
- RHSA-2020:3219
- SUSE-SU-2020:2027-1
- SUSE-SU-2020:2103-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2106-1
- SUSE-SU-2020:2107-1
- SUSE-SU-2020:2119-1
- SUSE-SU-2020:2121-1
- SUSE-SU-2020:2122-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2505-1
- SUSE-SU-2020:2506-1
- SUSE-SU-2020:2507-1
- SUSE-SU-2020:2508-1
- SUSE-SU-2020:2509-1
- SUSE-SU-2020:2513-1
- SUSE-SU-2020:2515-1
- SUSE-SU-2020:2517-1
- SUSE-SU-2020:2524-1
- SUSE-SU-2020:2526-1
- SUSE-SU-2020:2531-1
- USN-4425-1
- USN-4426-1
- USN-4439-1
- USN-4440-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2020-5792 | https://linux.oracle.com/errata/ELSA-2020-5792.html | |
CVE | CVE-2020-15780 | https://linux.oracle.com/cve/CVE-2020-15780.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-7 | oraclelinux | python-perf | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-7 | oraclelinux | perf | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-8 | oraclelinux | kernel-uek | < 5.4.17-2011.4.6.el8uek | oraclelinux-8 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-tools-libs?distro=oraclelinux-7 | oraclelinux | kernel-uek-tools-libs | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-8 | oraclelinux | kernel-uek-doc | < 5.4.17-2011.4.6.el8uek | oraclelinux-8 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-8 | oraclelinux | kernel-uek-devel | < 5.4.17-2011.4.6.el8uek | oraclelinux-8 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-8 | oraclelinux | kernel-uek-debug | < 5.4.17-2011.4.6.el8uek | oraclelinux-8 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-8 | oraclelinux | kernel-uek-debug-devel | < 5.4.17-2011.4.6.el8uek | oraclelinux-8 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 5.4.17-2011.4.6.el7uek | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |