The following updates has been released for Oracle Linux:
ELSA-2018-3522 Important: Oracle Linux 6 spice-server security update
ELSA-2018-4268 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4268 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2018-4269 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update
ELSA-2018-4269 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2018-4265)
ELSA-2018-3522 Important: Oracle Linux 6 spice-server security update
ELSA-2018-4268 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4268 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2018-4269 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update
ELSA-2018-4269 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2018-4265)
ELSA-2018-3522 Important: Oracle Linux 6 spice-server security update
Oracle Linux Security Advisory ELSA-2018-3522
http://linux.oracle.com/errata/ELSA-2018-3522.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
x86_64:
spice-server-0.12.4-16.el6_10.2.x86_64.rpm
spice-server-devel-0.12.4-16.el6_10.2.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/spice-server-0.12.4-16.el6_10.2.src.rpm
Description of changes:
[0.12.4-16.2]
- Prevent potential buffer/integer overflows with invalid MonitorsConfig
messages
sent from an authenticated client
Resolves: CVE-2017-7506
[0.12.4-16.1]
- Fix flexible array buffer overflow
Resolves: rhbz#1596008
ELSA-2018-4268 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4268
http://linux.oracle.com/errata/ELSA-2018-4268.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-firmware-3.8.13-118.26.1.el6uek.noarch.rpm
kernel-uek-doc-3.8.13-118.26.1.el6uek.noarch.rpm
kernel-uek-3.8.13-118.26.1.el6uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.26.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.26.1.el6uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.26.1.el6uek.x86_64.rpm
dtrace-modules-3.8.13-118.26.1.el6uek-0.4.5-3.el6.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-3.8.13-118.26.1.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/dtrace-modules-3.8.13-118.26.1.el6uek-0.4.5-3.el6.src.rpm
Description of changes:
kernel-uek
[3.8.13-118.26.1.el6uek]
- netfilter: xt_TCPMSS: add more sanity tests on tcph->doff (Eric
Dumazet) [Orabug: 27896807] {CVE-2017-18017}
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927692] {CVE-2018-7757}
ELSA-2018-4268 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4268
http://linux.oracle.com/errata/ELSA-2018-4268.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-firmware-3.8.13-118.26.1.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-118.26.1.el7uek.noarch.rpm
kernel-uek-3.8.13-118.26.1.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.26.1.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.26.1.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.26.1.el7uek.x86_64.rpm
dtrace-modules-3.8.13-118.26.1.el7uek-0.4.5-3.el7.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-118.26.1.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-118.26.1.el7uek-0.4.5-3.el7.src.rpm
Description of changes:
kernel-uek
[3.8.13-118.26.1.el7uek]
- netfilter: xt_TCPMSS: add more sanity tests on tcph->doff (Eric
Dumazet) [Orabug: 27896807] {CVE-2017-18017}
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927692] {CVE-2018-7757}
ELSA-2018-4269 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4269
http://linux.oracle.com/errata/ELSA-2018-4269.html
The following updated rpms for Oracle Linux 5 Extended Lifecycle Support
(ELS) have been uploaded to the Unbreakable Linux Network:
i386:
kernel-uek-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-debug-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-devel-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-doc-2.6.39-400.303.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.303.1.el5uek.noarch.rpm
x86_64:
kernel-uek-firmware-2.6.39-400.303.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.39-400.303.1.el5uek.noarch.rpm
kernel-uek-2.6.39-400.303.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.303.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.303.1.el5uek.x86_64.rpm
Description of changes:
[2.6.39-400.303.1.el5uek]
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927686] {CVE-2018-7757}
- Revert "Fix up non-directory creation in SGID directories" (Brian
Maly) [Orabug: 28781234]
ELSA-2018-4269 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4269
http://linux.oracle.com/errata/ELSA-2018-4269.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-debug-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-devel-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-doc-2.6.39-400.303.1.el6uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.303.1.el6uek.noarch.rpm
x86_64:
kernel-uek-firmware-2.6.39-400.303.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.39-400.303.1.el6uek.noarch.rpm
kernel-uek-2.6.39-400.303.1.el6uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.303.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el6uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.303.1.el6uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.39-400.303.1.el6uek.src.rpm
Description of changes:
[2.6.39-400.303.1.el6uek]
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927686] {CVE-2018-7757}
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2018-4265)
Synopsis: ELSA-2018-4265 can now be patched using Ksplice
CVEs: CVE-2017-13168 CVE-2018-7757
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2018-4265.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-13168: Denial-of-service in sg read/write implementation.
An unsafe implementation of read/write in the sg driver can result in
userspace being able to corrupt Kernel memory. A local user with access
to an sg device could use this flaw to cause undefined behaviour or a
Kernel crash, leading to a denial-of-service.
Orabug: 28824718
* Memory leak in Intel XL710 rx descriptor cleanup.
A failure to properly clean up the rx descriptors in the Intel XL710
driver could lead to a memory leak and possible denial-of-service.
Orabug: 28228724
* CVE-2018-7757: Memory leak when reading invalid_dword_count attribute of SAS Domain Transport driver.
A missing free when reading invalid_dword_count attribute of SAS Domain
Transport driver could lead to a memory leak. A local attacker could use
this flaw to exhaust kernel memory and cause a denial-of-service.
Orabug: 27927687
* Denial-of-service when an I/O error happens while reading OCFS2 block.
A logic error when an I/O error happens while reading OCFS2 block could
lead to a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.
Orabug: 28580543
* Use-after-free while using GRO with Mellanox Technologies 1/10/40Gbit Ethernet driver.
A logic error when using Generic Receive Offload (GRO) with Mellanox
Technologies 1/10/40Gbit Ethernet driver could lead to a use-after-free.
A local attacker could use this flaw to cause a denial-of-service.
Orabug: 28376051
* Invalid memory access during initialization of QLogic QLA2XXX Fibre Channel driver.
A race condition during initialization of QLogic QLA2XXX Fibre Channel
driver could lead to an invalid memory access. A local attacker could
use this flaw to cause a denial-of-service.
Orabug: 28013813
* Denial-of-service when forking a process with hugetlb mappings.
A logic error when forking a process with hugetlb mappings could lead to
a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.
Orabug: 28839992
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.