[ELSA-2020-5962] Unbreakable Enterprise kernel security update
[4.1.12-124.45.6]
- qla2xxx: disable target reset during link reset and update version (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: Fix early srb free on abort (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (Masanari Iida) [Orabug: 32095664]
- scsi: qla2xxx: Enable Async TMF processing (himanshu.madhani@cavium.com) [Orabug: 32095664]
- qla2xxx: tweak debug message for task management path (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (Arun Easi) [Orabug: 32095664]
- scsi: qla2xxx: Fix fabric scan hang (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: Do command completion on abort timeout (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: Fix abort timeout race condition. (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: Fix race between switch cmd completion and timeout (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: Add IOCB resource tracking (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx:v2: Fix double scsi_done for abort path (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: v2 Fix a race condition between aborting and completing a SCSI command (Bart Van Assche) [Orabug: 32095664]
- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (Bart Van Assche) [Orabug: 32095664]
- scsi: qla2xxx: v2 Reject EH_{abort|device_reset|target_request} (Quinn Tran) [Orabug: 32095664]
- scsi: qla2xxx: v2: Fix race conditions in the code for aborting SCSI commands (Bart Van Assche) [Orabug: 32095664]
[4.1.12-124.45.5]
- IB/ipoib: Arm 'send_cq' to process completions in due time (Gerd Rausch) [Orabug: 31512608]
[4.1.12-124.45.4]
- block: Move part of bdi_destory() to del_gendisk() as bdi_unregister(). (Jan Kara) [Orabug: 32124131]
- kernel: add panic_on_taint (Rafael Aquini) [Orabug: 32138039]
[4.1.12-124.45.3]
- drm/vmwgfx: Make sure backup_handle is always valid (Sinclair Yeh) [Orabug: 31352076] {CVE-2017-9605}
- random32: move the pseudo-random 32-bit definitions to prandom.h (Linus Torvalds) [Orabug: 31698086] {CVE-2020-16166}
- random32: remove net_rand_state from the latent entropy gcc plugin (Linus Torvalds) [Orabug: 31698086] {CVE-2020-16166}
- random: fix circular include dependency on arm64 after addition of percpu.h (Willy Tarreau) [Orabug: 31698086] {CVE-2020-16166}
- random32: update the net random state on interrupt and activity (Willy Tarreau) [Orabug: 31698086] {CVE-2020-16166}
- x86/kvm: move kvm_load/put_guest_xcr0 into atomic context (WANG Chao) [Orabug: 32021856]
- kvm: x86: do not leak guest xcr0 into host interrupt handlers (David Matlack) [Orabug: 32021856]
- ID
- ELSA-2020-5962
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2020-5962.html
- Published
-
2020-12-02T00:00:00
(3 years ago) - Modified
-
2020-12-02T00:00:00
(3 years ago) - Rights
- Copyright 2020 Oracle, Inc.
- Other Advisories
-
- DSA-3927-1
- DSA-3945-1
- ELSA-2020-5473
- ELSA-2020-5844
- ELSA-2020-5845
- ELSA-2020-5848
- ELSA-2020-5885
- FEDORA-2020-2cd6393548
- FEDORA-2020-8d634e31c0
- MS:CVE-2020-16166
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2020:1236-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:5473
- RHSA-2020:5506
- SSA:2020-295-01
- SUSE-SU-2020:2485-1
- SUSE-SU-2020:2486-1
- SUSE-SU-2020:2540-1
- SUSE-SU-2020:2541-1
- SUSE-SU-2020:2574-1
- SUSE-SU-2020:2575-1
- SUSE-SU-2020:2576-1
- SUSE-SU-2020:2582-1
- SUSE-SU-2020:2605-1
- SUSE-SU-2020:2610-1
- SUSE-SU-2020:2623-1
- SUSE-SU-2020:2631-1
- USN-3358-1
- USN-3359-1
- USN-3360-1
- USN-3360-2
- USN-3364-1
- USN-3364-2
- USN-3364-3
- USN-3371-1
- USN-4525-1
- USN-4526-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2020-5962 | https://linux.oracle.com/errata/ELSA-2020-5962.html | |
CVE | CVE-2020-16166 | https://linux.oracle.com/cve/CVE-2020-16166.html | |
CVE | CVE-2017-9605 | https://linux.oracle.com/cve/CVE-2017-9605.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.45.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.45.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.45.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.45.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.45.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.45.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.45.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.45.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.45.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.45.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.45.6.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.45.6.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |