El-errata: ELSA-2020-5714 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2020-5714
http://linux.oracle.com/errata/ELSA-2020-5714.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-5.4.17-2011.3.2.1.el7uek.x86_64.rpm
kernel-uek-debug-5.4.17-2011.3.2.1.el7uek.x86_64.rpm
kernel-uek-debug-devel-5.4.17-2011.3.2.1.el7uek.x86_64.rpm
kernel-uek-devel-5.4.17-2011.3.2.1.el7uek.x86_64.rpm
kernel-uek-doc-5.4.17-2011.3.2.1.el7uek.noarch.rpm
kernel-uek-tools-5.4.17-2011.3.2.1.el7uek.x86_64.rpm
aarch64:
kernel-uek-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
kernel-uek-debug-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
kernel-uek-debug-devel-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
kernel-uek-devel-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
kernel-uek-doc-5.4.17-2011.3.2.1.el7uek.noarch.rpm
kernel-uek-tools-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
kernel-uek-tools-libs-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
perf-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
python-perf-5.4.17-2011.3.2.1.el7uek.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-5.4.17-2011.3.2.1.el7uek.src.rpm
Description of changes:
[5.4.17-2011.3.2.1.el7uek]
- x86/speculation: Add Ivy Bridge to affected list (Josh Poimboeuf) [Orabug: 31352779] {CVE-2020-0543}
- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}
- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}
- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}
- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31352779] {CVE-2020-0543}
- x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2 (Tony W Wang-oc) [Orabug: 31352779] {CVE-2020-0543}
[5.4.17-2011.3.2.el7uek]
- USB: core: Fix free-while-in-use bug in the USB S-Glibrary (Alan Stern) [Orabug: 31350962] {CVE-2020-12464}
- mt76: fix array overflow on receiving too many fragments for a packet (Felix Fietkau) [Orabug: 31350952] {CVE-2020-12465}
- mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Qing Xu) [Orabug: 31350929] {CVE-2020-12653}
- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (Zhiqiang Liu) [Orabug: 31350910] {CVE-2020-12657}
- xsk: Add missing check on user supplied headroom size (Magnus Karlsson) [Orabug: 31350732] {CVE-2020-12659}
- mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Qing Xu) [Orabug: 31350513] {CVE-2020-12654}
- xen/manage: enable C_A_D to force reboot (Dongli Zhang) [Orabug: 31387411]
- KVM: x86: Fixes posted interrupt check for IRQs delivery modes (Suravee Suthikulpanit) [Orabug: 31316437]
- Revert "Revert "nvme_fc: add module to ops template to allow module references"" (James Smart) [Orabug: 31377552]
- uek-rpm: Move grub boot menu update to posttrans stage. (Somasundaram Krishnasamy) [Orabug: 31358097]
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (Miaohe Lin) [Orabug: 31350455] {CVE-2020-12768}
[5.4.17-2011.3.1.el7uek]
- intel_idle: Use ACPI _CST for processor models without C-state tables (Rafael J. Wysocki) [Orabug: 31332120]
- ACPI: processor: Export acpi_processor_evaluate_cst() (Rafael J. Wysocki) [Orabug: 31332120]
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (Rafael J. Wysocki) [Orabug: 31332120]
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (Rafael J. Wysocki) [Orabug: 31332120]
- ACPI: processor: Export function to claim _CST control (Rafael J. Wysocki) [Orabug: 31332120]
- rds: ib: Fix dysfunctional long address resolve timeout (Håkon Bugge) [Orabug: 31302704]
- KVM: x86: Revert "KVM: X86: Fix fpu state crash in kvm guest" (Sean Christopherson) [Orabug: 31333676]
- KVM: x86: Ensure guest's FPU state is loaded when accessing for emulation (Sean Christopherson) [Orabug: 31333676]
- KVM: x86: Handle TIF_NEED_FPU_LOAD in kvm_{load,put}_guest_fpu() (Sean Christopherson) [Orabug: 31333676]
- net: dsa: Do not leave DSA master with NULL netdev_ops (Florian Fainelli) [Orabug: 30456791]
- Revert "dsa: disable module unloading for ARM64" (Allen Pais) [Orabug: 30456791]
[5.4.17-2011.3.0.el7uek]
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (Robert Milkowski) [Orabug: 31304406]
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (Robert Milkowski) [Orabug: 31304406]
- btrfs: Don't submit any btree write bio if the fs has errors (Qu Wenruo) [Orabug: 31265336] {CVE-2019-19377} {CVE-2019-19377}
An Unbreakable Enterprise kernel security update has been released for Oracle Linux 7.