Oracle alert ELSA-2020-5526 (kernel)
| From: | Errata Announcements for Oracle Linux <el-errata@oss.oracle.com> | |
| To: | el-errata@oss.oracle.com | |
| Subject: | [El-errata] ELSA-2020-5526 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update (aarch64) | |
| Date: | Thu, 30 Jan 2020 13:59:20 -0800 | |
| Message-ID: | <ebc64504-5027-bb30-aafb-a1b0bac3ba33@oracle.com> |
Oracle Linux Security Advisory ELSA-2020-5526 http://linux.oracle.com/errata/ELSA-2020-5526.html The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network: aarch64: kernel-uek-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-debug-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-debug-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-tools-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-tools-libs-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-tools-libs-devel-4.14.35-1902.10.4.el7uek.aarch64.rpm perf-4.14.35-1902.10.4.el7uek.aarch64.rpm python-perf-4.14.35-1902.10.4.el7uek.aarch64.rpm kernel-uek-headers-4.14.35-1902.10.4.el7uek.aarch64.rpm SRPMS: http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-4.14.3... Description of changes: [4.14.35-1902.10.4.el7uek] - kvm: Don't reference vcpu->arch.st in arch-independent code (Boris Ostrovsky) [Orabug: 30489861] - kvm: fix compile on s390 part 2 (Christian Borntraeger) [Orabug: 30489861] - kvm: fix compilation on s390 (Paolo Bonzini) [Orabug: 30489861] - kvm: fix compilation on aarch64 (Paolo Bonzini) [Orabug: 30489861] [4.14.35-1902.10.3.el7uek] - x86/KVM: Clean up host's steal time structure (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/kvm: Cache gfn to pfn translation (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/kvm: Introduce kvm_(un)map_gfn() (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (Boris Ostrovsky) [Orabug: 30489861] {CVE-2019-3016} {CVE-2019-3016} - KVM: Properly check if "page" is valid in kvm_vcpu_unmap (KarimAllah Ahmed) [Orabug: 30489861] - KVM: Introduce a new guest mapping API (KarimAllah Ahmed) [Orabug: 30489861] - KVM: x86: svm: make sure NMI is injected after nmi_singlestep (Vitaly Kuznetsov) [Orabug: 30714532] _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata
