|
|
Log in / Subscribe / Register

Oracle alert ELSA-2020-5526 (kernel)

From:  Errata Announcements for Oracle Linux <el-errata@oss.oracle.com>
To:  el-errata@oss.oracle.com
Subject:  [El-errata] ELSA-2020-5526 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update (aarch64)
Date:  Thu, 30 Jan 2020 13:59:20 -0800
Message-ID:  <ebc64504-5027-bb30-aafb-a1b0bac3ba33@oracle.com>

Oracle Linux Security Advisory ELSA-2020-5526 http://linux.oracle.com/errata/ELSA-2020-5526.html The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network: aarch64: kernel-uek-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-debug-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-debug-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-tools-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-tools-libs-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-tools-libs-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm perf-4.14.35-1902.10.4.el7uek.aarch64.rpm python-perf-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-headers-4.14.35-1902.10.4.el7uek.aarch64.rpm SRPMS: http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-4.14.3... Description of changes: [4.14.35-1902.10.4.el7uek] - kvm: Don't reference vcpu->arch.st in arch-independent code (Boris Ostrovsky) [Orabug: 30489861] - kvm: fix compile on s390 part 2 (Christian Borntraeger) [Orabug: 30489861] - kvm: fix compilation on s390 (Paolo Bonzini) [Orabug: 30489861] - kvm: fix compilation on aarch64 (Paolo Bonzini) [Orabug: 30489861] [4.14.35-1902.10.3.el7uek] - x86/KVM: Clean up host's steal time structure (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/kvm: Cache gfn to pfn translation (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/kvm: Introduce kvm_(un)map_gfn() (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - KVM: Properly check if "page" is valid in kvm_vcpu_unmap (KarimAllah Ahmed) [Orabug: 30489861] - KVM: Introduce a new guest mapping API (KarimAllah Ahmed) [Orabug: 30489861] - KVM: x86: svm: make sure NMI is injected after nmi_singlestep (Vitaly Kuznetsov) [Orabug: 30714532] _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds