Oracle Linux 6267 Published by

The following updates has been released for Oracle Linux:

ELSA-2018-2921 Important: Oracle Linux 7 tomcat security update (aarch64)
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2018-4250)



ELSA-2018-2921 Important: Oracle Linux 7 tomcat security update (aarch64)

Oracle Linux Security Advisory ELSA-2018-2921

http://linux.oracle.com/errata/ELSA-2018-2921.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

aarch64:
tomcat-7.0.76-8.el7_5.noarch.rpm
tomcat-admin-webapps-7.0.76-8.el7_5.noarch.rpm
tomcat-el-2.2-api-7.0.76-8.el7_5.noarch.rpm
tomcat-jsp-2.2-api-7.0.76-8.el7_5.noarch.rpm
tomcat-lib-7.0.76-8.el7_5.noarch.rpm
tomcat-servlet-3.0-api-7.0.76-8.el7_5.noarch.rpm
tomcat-webapps-7.0.76-8.el7_5.noarch.rpm
tomcat-docs-webapp-7.0.76-8.el7_5.noarch.rpm
tomcat-javadoc-7.0.76-8.el7_5.noarch.rpm
tomcat-jsvc-7.0.76-8.el7_5.noarch.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/tomcat-7.0.76-8.el7_5.src.rpm



Description of changes:

[0:7.0.76-8]
- Resolves: rhbz#1608608 CVE-2018-1336 tomcat: A bug in the UTF 8
decoder can lead to DoS


New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2018-4250)

Synopsis: ELSA-2018-4250 can now be patched using Ksplice
CVEs: CVE-2018-16658 CVE-2018-7492

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2018-4250.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR2 2.6.39 on
OL5 and OL6 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2018-16658: Information leak in CD-ROM status ioctl.

An incorrect bounds check in the CD-ROM driver could allow an
out-of-bounds access and kernel information leak to an unprivileged
user.


* CVE-2018-7492: Denial-of-service when setting options for RDS over Infiniband socket.

A missing check when setting RDS_GET_MR option for RDS over Infiniband
socket could lead to a NULL pointer dereference. A local attacker could
use this flaw to cause a denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.