Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2020-3010
History
Jul 24, 2020 - 12:00 a.m.
Vulners
/
Oraclelinux
/
kernel security, bug fix, and enhancement update
kernel security, bug fix, and enhancement update
2020-07-24
00:00:00
linux.oracle.com
38
EPSS
0.002
Percentile
55.3%
JSON
[4.18.0-193.13.2_2.OL8]
Oracle Linux certificates (Alexey Petrenko)
Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
Update x509.genkey [Orabug: 24817676]
[4.18.0-193.13.2_2]
Rebuild to get kernel image properly signed (Bruno Meneguele)
[4.18.0-193.13.1_2]
[x86] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (Lenny Szubowicz) [1846180 1824005]
[4.18.0-193.12.1_2]
[net] openvswitch: simplify the ovs_dp_cmd_new (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: fix possible memleak on destroy flow-table (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: add likely in flow_lookup (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: simplify the flow_hash (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: optimize flow-mask looking up (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: optimize flow mask cache hash collision (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: shrink the mask array if necessary (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: convert mask list in mask array (Eelco Chaudron) [1851235 1819202]
[net] openvswitch: add flow-mask cache for performance (Eelco Chaudron) [1851235 1819202]
[net] netfilter: nf_tables: use-after-free in dynamic operations (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: add missing ->release_ops() in error path of newrule() (Phil Sutter) [1845164 1757933]
[net] netfilter: nft_compat: use .release_ops and remove list of extension (Phil Sutter) [1845164 1757933]
[vfio] vfio/pci: Fix SR-IOV VF handling with MMIO blocking (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
[pci] PCI: pciehp: Fix MSI interrupt race (Myron Stowe) [1852045 1779610]
[kernel] smp: Allow smp_call_function_single_async() to insert locked csd (Peter Xu) [1851406 1830014]
[x86] kvm: Clean up host’s steal time structure (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
[x86] kvm: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
[virt] x86/kvm: Cache gfn to pfn translation (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
[virt] x86/kvm: Introduce kvm_(un)map_gfn() (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
[x86] kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (Jon Maloy) [1795128 1813987] {CVE-2019-3016}
[4.18.0-193.11.1_2]
[net] netfilter: conntrack: fix infinite loop on rmmod (Florian Westphal) [1851005 1832381]
[net] netfilter: conntrack: allow insertion of clashing entries (Florian Westphal) [1851003 1821404]
[net] netfilter: conntrack: split resolve_clash function (Florian Westphal) [1851003 1821404]
[net] netfilter: conntrack: place confirm-bit setting in a helper (Florian Westphal) [1851003 1821404]
[net] netfilter: never get/set skb->tstamp (Florian Westphal) [1851003 1821404]
[net] netfilter: conntrack: remove two args from resolve_clash (Florian Westphal) [1851003 1821404]
[net] netfilter: conntrack: tell compiler to not inline nf_ct_resolve_clash (Florian Westphal) [1851003 1821404]
[x86] mm: Fix mremap not considering huge pmd devmap (Rafael Aquini) [1843440 1843441] {CVE-2020-10757}
[x86] x86/vector: Remove warning on managed interrupt migration (Peter Xu) [1848545 1812331]
[s390] s390/cio: fix virtio-ccw DMA without PV (Philipp Rudo) [1842620 1814787]
[4.18.0-193.10.1_2]
[misc] dma-mapping: zero memory returned from dma_alloc_* (Philipp Rudo) [1847453 1788928]
[nvme] nvme-multipath: fix crash in nvme_mpath_clear_ctrl_paths (Gopal Tiwari) [1846405 1781927]
[net] netfilter: nf_tables: fix infinite loop when expr is not available (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: autoload modules from the abort path (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: remove WARN and add NLA_STRING upper limits (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: store transaction list locally while requesting module (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: use-after-free in failing rule with bound set (Phil Sutter) [1845164 1757933]
[net] netfilter: nft_meta: skip EAGAIN if nft_meta_bridge is not a module (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: force module load in case select_ops() returns -EAGAIN (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: add nft_expr_type_request_module() (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: bogus EBUSY in helper removal from transaction (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: fix set double-free in abort path (Phil Sutter) [1845164 1757933]
[net] netfilter: nft_compat: don’t use refcount_inc on newly allocated entry (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: unbind set in rule from commit path (Phil Sutter) [1845164 1757933]
[net] netfilter: nft_compat: destroy function must not have side effects (Phil Sutter) [1845164 1757933]
[net] netfilter: nft_compat: make lists per netns (Phil Sutter) [1845164 1757933]
[net] netfilter: nft_compat: use refcnt_t type for nft_xt reference count (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: fix suspicious RCU usage in nft_chain_stats_replace() (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: asynchronous release (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: split set destruction in deactivate and destroy phase (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: flow event notifier must use transaction mutex (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: use dedicated mutex to guard transactions (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: avoid global info storage (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: take module reference when starting a batch (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: make valid_genid callback mandatory (Phil Sutter) [1845164 1757933]
[net] netfilter: nf_tables: add and use helper for module autoload (Phil Sutter) [1845164 1757933]
[net] netfilter: nat: never update the UDP checksum when it’s 0 (Guillaume Nault) [1847128 1794714]
[x86] x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches (Waiman Long) [1847395 1847396] {CVE-2020-10768}
[x86] x86/speculation: Prevent rogue cross-process SSBD shutdown (Waiman Long) [1847357 1847358] {CVE-2020-10766}
[x86] x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS (Waiman Long) [1847378 1847379] {CVE-2020-10767}
[x86] x86/speculation: Add support for STIBP always-on preferred mode (Waiman Long) [1847378 1847379] {CVE-2020-10767}
[x86] x86/speculation: Change misspelled STIPB to STIBP (Waiman Long) [1847378 1847379] {CVE-2020-10767}
[powerpc] powerpc/pseries/ddw: Extend upper limit for huge DMA window for persistent memory (Steve Best) [1842406 1817596]
[4.18.0-193.9.1_2]
[wireless] mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Jarod Wilson) [1844073 1844031] {CVE-2020-12654}
[wireless] mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Jarod Wilson) [1844049 1844039] {CVE-2020-12653}
[netdrv] net/mlx5: FPGA, support network cards with standalone FPGA (Alaa Hleihel) [1843544 1789380]
[mm] hugetlbfs: don’t retry when pool page allocations start to fail (Rafael Aquini) [1835789 1727288]
[mm] mm, compaction: raise compaction priority after it withdrawns (Rafael Aquini) [1835789 1727288]
[mm] mm, reclaim: cleanup should_continue_reclaim() (Rafael Aquini) [1835789 1727288]
[mm] mm, reclaim: make should_continue_reclaim perform dryrun detection (Rafael Aquini) [1835789 1727288]
[kernel] exit: panic before exit_mm() on global init exit (Oleg Nesterov) [1821378 1808944]
[documentation] x86/speculation: Add Ivy Bridge to affected list (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
[documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
[x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
[x86] x86/cpu: Add ‘table’ argument to cpu_matches() (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
[x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}
[4.18.0-193.8.1_2]
[vfio] vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
[vfio] vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
[vfio] vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
[vfio] vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
[vfio] vfio/pci: call irq_bypass_unregister_producer() before freeing irq (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
[vfio] vfio_pci: Enable memory accesses before calling pci_map_rom (Alex Williamson) [1837309 1837310] {CVE-2020-12888}
[4.18.0-193.7.1_2]
[sound] ALSA: timer: Fix incorrectly assigned timer instance (Jaroslav Kysela) [1821714 1798468] {CVE-2019-19807}
[netdrv] ibmvnic: Do not process device remove during device reset (Steve Best) [1836229 1813223]
[net] ipv4: really enforce backoff for redirects (Paolo Abeni) [1836302 1834184]
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
8
src
kernel
<Â 4.18.0-193.13.2.el8_2
kernel-4.18.0-193.13.2.el8_2.src.rpm
oracle linux
8
aarch64
bpftool
<Â 4.18.0-193.13.2.el8_2
bpftool-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
aarch64
kernel-cross-headers
<Â 4.18.0-193.13.2.el8_2
kernel-cross-headers-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
aarch64
kernel-headers
<Â 4.18.0-193.13.2.el8_2
kernel-headers-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
aarch64
kernel-tools
<Â 4.18.0-193.13.2.el8_2
kernel-tools-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
aarch64
kernel-tools-libs
<Â 4.18.0-193.13.2.el8_2
kernel-tools-libs-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
aarch64
kernel-tools-libs-devel
<Â 4.18.0-193.13.2.el8_2
kernel-tools-libs-devel-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
aarch64
perf
<Â 4.18.0-193.13.2.el8_2
perf-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
aarch64
python3-perf
<Â 4.18.0-193.13.2.el8_2
python3-perf-4.18.0-193.13.2.el8_2.aarch64.rpm
oracle linux
8
src
kernel
<Â 4.18.0-193.13.2.el8_2
kernel-4.18.0-193.13.2.el8_2.src.rpm
Rows per page:
10
​
1-10 of 30
1
Related
redhat 19
nessus 59
openvas 27
fedora 6
ibm 1
attackerkb 1
amazon 3
oraclelinux 4
centos 2
ubuntu 6
photon 5
mageia 1
nvd 7
veracode 6
debiancve 7
prion 6
redhatcve 7
cvelist 8
f5 3
symantec 1
cve 5
ubuntucve 7
osv 3
cbl_mariner 5
redhat
redhat
19
(RHSA-2020:3016) Important: kernel-rt security and bug fix update
2020-07-21 11:15:46
(RHSA-2020:3010) Important: kernel security, bug fix, and enhancement update
2020-07-21 10:21:25
(RHSA-2020:3041) Important: kernel security and bug fix update
2020-07-21 14:15:28
nessus
nessus
59
RHEL 8 : kernel-rt (RHSA-2020:3016)
2020-07-21 00:00:00
Oracle Linux 8 : kernel (ELSA-2020-3010)
2023-09-07 00:00:00
RHEL 8 : kernel (RHSA-2020:3010)
2020-07-21 00:00:00
openvas
openvas
27
SUSE: Security Advisory (SUSE-SU-2020:1713-1)
2021-04-19 00:00:00
Fedora: Security Advisory for kernel (FEDORA-2020-1b2dae6219)
2020-06-23 00:00:00
Fedora: Security Advisory for kernel (FEDORA-2020-125ccdc871)
2020-06-23 00:00:00
fedora
fedora
6
[SECURITY] Fedora 31 Update: kernel-5.6.19-200.fc31
2020-06-23 01:14:58
[SECURITY] Fedora 32 Update: kernel-5.6.19-300.fc32
2020-06-19 01:05:59
[SECURITY] Fedora 32 Update: kernel-5.6.18-300.fc32
2020-06-15 01:58:35
ibm
ibm
Security Bulletin: There are multiple vulnerabilities in the Linux Kernel used in IBM Elastic Storage System
2022-05-25 23:01:32
attackerkb
attackerkb
CVE-2018-3639
2018-05-22 00:00:00
amazon
amazon
Important: kernel
2020-07-21 16:34:00
Important: kernel
2020-07-14 21:14:00
Important: kernel
2020-07-21 16:34:00
oraclelinux
oraclelinux
4
kernel security and bug fix update
2020-07-30 00:00:00
kernel security and bug fix update
2020-06-23 00:00:00
Unbreakable Enterprise kernel security update
2020-08-10 00:00:00
centos
centos
bpftool, kernel, perf, python security update
2020-06-23 19:56:05
bpftool, kernel, perf, python security update
2020-07-30 00:08:16
ubuntu
ubuntu
6
Linux kernel vulnerabilities
2020-06-10 00:00:00
Linux kernel vulnerabilities
2020-06-10 00:00:00
linux kernel vulnerabilities
2020-07-31 00:00:00
photon
photon
5
Important Photon OS Security Update - PHSA-2020-0108
2020-06-30 00:00:00
Home Download Photon OS User Documentation FAQ Security Advisories Related Information Lightwave - PHSA-2020-2.0-0256
2020-06-27 00:00:00
Important Photon OS Security Update - PHSA-2020-3.0-0108
2020-06-30 00:00:00
mageia
mageia
Updated kernel packages fix security vulnerability
2020-08-18 21:47:25
nvd
nvd
7
CVE-2019-19807
2019-12-15 23:15:11
CVE-2020-12888
2020-05-15 18:15:13
CVE-2020-10757
2020-06-09 13:15:10
veracode
veracode
6
Use-after-free
2020-07-22 03:44:49
Privilege Escalation
2020-07-08 03:21:33
Information Disclosure
2020-07-22 03:54:55
debiancve
debiancve
7
CVE-2019-19807
2019-12-15 23:15:11
CVE-2020-10767
2020-09-15 23:15:12
CVE-2020-12888
2020-05-15 18:15:13
prion
prion
6
Design/Logic Flaw
2019-12-15 23:15:00
Design/Logic Flaw
2020-06-09 13:15:00
Design/Logic Flaw
2020-09-15 23:15:00
redhatcve
redhatcve
7
CVE-2019-19807
2019-12-23 11:08:45
CVE-2020-10766
2020-06-10 10:24:45
CVE-2020-10767
2020-06-10 10:25:00
cvelist
cvelist
8
CVE-2019-19807
2019-12-15 22:59:14
CVE-2020-12653
2020-05-05 04:47:35
CVE-2020-10766
2020-09-15 22:10:27
f5
f5
K57397944 : Linux kernel vulnerability CVE-2019-19807
2022-06-02 00:00:00
K05617914 : Linux kernel vulnerability CVE-2020-10757
2020-10-13 00:00:00
K44435547 : Linux Kernel Vulnerability CVE-2020-12653
2020-06-25 00:00:00
symantec
symantec
Linux Kernel CVE-2019-19807 Denial of Service Vulnerability
2019-12-15 00:00:00
cve
cve
5
CVE-2019-19807
2019-12-15 23:15:11
CVE-2020-10766
2020-09-15 23:15:12
CVE-2020-12888
2020-05-15 18:15:13
ubuntucve
ubuntucve
7
CVE-2020-10766
2020-06-10 00:00:00
CVE-2019-19807
2019-12-15 00:00:00
CVE-2020-10767
2020-06-10 00:00:00
osv
osv
CVE-2020-12653
2020-05-05 06:15:11
Silent Spectre-BTB outages in Linux for Android
2021-01-01 00:00:00
Android Vomit Report
2021-01-01 00:00:00
cbl_mariner
cbl_mariner
5
CVE-2020-12653 affecting package kernel 5.4.91-6
2021-04-06 23:51:14
CVE-2020-10766 affecting package kernel 5.4.91-6
2021-03-03 03:44:27
CVE-2020-10767 affecting package kernel 5.4.91-6
2021-03-03 03:44:27
EPSS
0.002
Percentile
55.3%
JSON
Related for ELSA-2020-3010
redhat
19
nessus
59
openvas
27
fedora
6
ibm
1
attackerkb
1
amazon
3
oraclelinux
4
centos
2
ubuntu
6
photon
5
mageia
1
nvd
7
veracode
6
debiancve
7
prion
6
redhatcve
7
cvelist
8
f5
3
symantec
1
cve
5
ubuntucve
7
osv
3
cbl_mariner
5