Описание
ELSA-2020-5732: Unbreakable Enterprise kernel security update (IMPORTANT)
[4.14.35-1902.303.5.3]
- rds: Deregister all FRWR mr with free_mr (Hans Westgaard Ry) [Orabug: 31476202]
- Revert rds: Do not cancel RDMAs that have been posted to the HCA (Gerd Rausch) [Orabug: 31475329]
- Revert rds: Introduce rds_conn_to_path helper (Gerd Rausch) [Orabug: 31475329]
- Revert rds: Three cancel fixes (Gerd Rausch) [Orabug: 31475318]
[4.14.35-1902.303.5.2]
- rds: Three cancel fixes (Hakon Bugge) [Orabug: 31463014]
[4.14.35-1902.303.5.1]
- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31446720] {CVE-2020-0543}
[4.14.35-1902.303.5]
- net/mlx5: Decrease default mr cache size (Artemy Kovalyov) [Orabug: 31446379]
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
kernel-uek
4.14.35-1902.303.5.3.el7uek
kernel-uek-debug
4.14.35-1902.303.5.3.el7uek
kernel-uek-debug-devel
4.14.35-1902.303.5.3.el7uek
kernel-uek-devel
4.14.35-1902.303.5.3.el7uek
kernel-uek-headers
4.14.35-1902.303.5.3.el7uek
kernel-uek-tools
4.14.35-1902.303.5.3.el7uek
kernel-uek-tools-libs
4.14.35-1902.303.5.3.el7uek
kernel-uek-tools-libs-devel
4.14.35-1902.303.5.3.el7uek
perf
4.14.35-1902.303.5.3.el7uek
python-perf
4.14.35-1902.303.5.3.el7uek
Oracle Linux x86_64
kernel-uek
4.14.35-1902.303.5.3.el7uek
kernel-uek-debug
4.14.35-1902.303.5.3.el7uek
kernel-uek-debug-devel
4.14.35-1902.303.5.3.el7uek
kernel-uek-devel
4.14.35-1902.303.5.3.el7uek
kernel-uek-doc
4.14.35-1902.303.5.3.el7uek
kernel-uek-tools
4.14.35-1902.303.5.3.el7uek
Связанные CVE
Связанные уязвимости
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Incomplete cleanup from specific special register read operations in s ...