[ELSA-2020-5879] Unbreakable Enterprise kernel security update
kernel-uek
[3.8.13-118.50.1]
- USB: serial: omninet: fix reference leaks at open (Mark Nicholson) [Orabug: 30484762] {CVE-2017-8925}
- GFS2: don't set rgrp gl_object until it's inserted into rgrp tree (Bob Peterson) [Orabug: 30254252] {CVE-2016-10905}
- GFS2: Fix rgrp end rounding problem for bsize < page size (Bob Peterson) [Orabug: 30254252] {CVE-2016-10905}
- GFS2: Use range based functions for rgrp sync/invalidation (Steven Whitehouse) [Orabug: 30254252] {CVE-2016-10905}
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (YueHaibing) [Orabug: 30732940] {CVE-2019-20054}
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (YueHaibing) [Orabug: 30732940] {CVE-2019-20054}
- scsi: libsas: stop discovering if oob mode is disconnected (Jason Yan) [Orabug: 30770914] {CVE-2019-19965}
- ath9k_htc: release allocated buffer if timed out (Navid Emamdoost) [Orabug: 31351573] {CVE-2019-19073}
- USB: serial: io_ti: fix information leak in completion handler (Johan Hovold) [Orabug: 31352085] {CVE-2017-8924}
- mm/hugetlb: fix a race between hugetlb sysctl handlers (Muchun Song) [Orabug: 31884241] {CVE-2020-25285}
- ext4: fix potential negative array index in do_split() (Eric Sandeen) [Orabug: 31895332] {CVE-2020-14314}
- ID
- ELSA-2020-5879
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2020-5879.html
- Published
-
2020-10-09T00:00:00
(3 years ago) - Modified
-
2020-10-09T00:00:00
(3 years ago) - Rights
- Copyright 2020 Oracle, Inc.
- Other Advisories
-
- ALAS-2020-1338
- ALAS-2020-1437
- ALAS2-2020-1392
- ALAS2-2020-1480
- ALAS2-2020-1495
- ALSA-2020:4431
- ALSA-2021:1578
- DSA-3886-1
- ELSA-2020-1769
- ELSA-2020-4060
- ELSA-2020-5437
- ELSA-2020-5533
- ELSA-2020-5676
- ELSA-2020-5845
- ELSA-2020-5866
- ELSA-2020-5881
- ELSA-2020-5884
- ELSA-2020-5885
- ELSA-2020-5936
- ELSA-2021-1578
- FEDORA-2019-021c968423
- FEDORA-2019-124a241044
- FEDORA-2019-34a75d7e61
- FEDORA-2019-39e97683e8
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-b86a7bdba0
- FEDORA-2020-203ffedeb5
- FEDORA-2020-227a4c0530
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-3cd64d683c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-e328697628
- FEDORA-2020-f884f9dd7d
- FEDORA-2020-fe00e12580
- MS:CVE-2020-14314
- MS:CVE-2020-25285
- openSUSE-SU-2019:2675-1
- openSUSE-SU-2020:0336-1
- openSUSE-SU-2020:1325-1
- openSUSE-SU-2020:1382-1
- openSUSE-SU-2020:1906-1
- openSUSE-SU-2020:2112-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:1567
- RHSA-2020:1769
- RHSA-2020:4060
- RHSA-2020:4062
- RHSA-2020:4431
- RHSA-2020:4609
- RHSA-2020:5437
- RHSA-2020:5441
- RHSA-2021:1578
- RHSA-2021:1739
- SSA:2019-311-01
- SSA:2020-086-01
- SSA:2020-295-01
- SUSE-SU-2017:1853-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2389-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2019:3200-1
- SUSE-SU-2019:3289-1
- SUSE-SU-2019:3316-1
- SUSE-SU-2019:3317-1
- SUSE-SU-2019:3371-1
- SUSE-SU-2019:3372-1
- SUSE-SU-2019:3379-1
- SUSE-SU-2019:3381-1
- SUSE-SU-2020:0093-1
- SUSE-SU-2020:0511-1
- SUSE-SU-2020:0558-1
- SUSE-SU-2020:0559-1
- SUSE-SU-2020:0560-1
- SUSE-SU-2020:0580-1
- SUSE-SU-2020:0584-1
- SUSE-SU-2020:0599-1
- SUSE-SU-2020:0605-1
- SUSE-SU-2020:0613-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:1275-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:2485-1
- SUSE-SU-2020:2486-1
- SUSE-SU-2020:2540-1
- SUSE-SU-2020:2541-1
- SUSE-SU-2020:2574-1
- SUSE-SU-2020:2575-1
- SUSE-SU-2020:2576-1
- SUSE-SU-2020:2582-1
- SUSE-SU-2020:2605-1
- SUSE-SU-2020:2610-1
- SUSE-SU-2020:2623-1
- SUSE-SU-2020:2631-1
- SUSE-SU-2020:3122-1
- SUSE-SU-2020:3272-1
- SUSE-SU-2020:3281-1
- SUSE-SU-2020:3326-1
- SUSE-SU-2020:3484-1
- SUSE-SU-2020:3491-1
- SUSE-SU-2020:3512-1
- SUSE-SU-2020:3513-1
- SUSE-SU-2020:3522-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0762-1
- USN-3359-1
- USN-3360-1
- USN-3360-2
- USN-3361-1
- USN-4145-1
- USN-4284-1
- USN-4285-1
- USN-4286-1
- USN-4286-2
- USN-4287-1
- USN-4287-2
- USN-4526-1
- USN-4527-1
- USN-4576-1
- USN-4578-1
- USN-4579-1
- USN-4660-1
- USN-4752-1
- USN-4912-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2020-5879 | https://linux.oracle.com/errata/ELSA-2020-5879.html | |
CVE | CVE-2019-19965 | https://linux.oracle.com/cve/CVE-2019-19965.html | |
CVE | CVE-2019-20054 | https://linux.oracle.com/cve/CVE-2019-20054.html | |
CVE | CVE-2019-19073 | https://linux.oracle.com/cve/CVE-2019-19073.html | |
CVE | CVE-2020-25285 | https://linux.oracle.com/cve/CVE-2020-25285.html | |
CVE | CVE-2016-10905 | https://linux.oracle.com/cve/CVE-2016-10905.html | |
CVE | CVE-2017-8924 | https://linux.oracle.com/cve/CVE-2017-8924.html | |
CVE | CVE-2017-8925 | https://linux.oracle.com/cve/CVE-2017-8925.html | |
CVE | CVE-2020-14314 | https://linux.oracle.com/cve/CVE-2020-14314.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 3.8.13-118.50.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 3.8.13-118.50.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 3.8.13-118.50.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 3.8.13-118.50.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 3.8.13-118.50.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 3.8.13-118.50.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 3.8.13-118.50.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 3.8.13-118.50.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 3.8.13-118.50.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 3.8.13-118.50.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 3.8.13-118.50.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 3.8.13-118.50.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-3.8.13-118.50.1.el7uek?distro=oraclelinux-7 | oraclelinux | dtrace-modules-3.8.13-118.50.1.el7uek | < 0.4.5-3.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-3.8.13-118.50.1.el6uek?distro=oraclelinux-6 | oraclelinux | dtrace-modules-3.8.13-118.50.1.el6uek | < 0.4.5-3.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |