Oracle Linux 6263 Published by

The following updates has been released for Oracle Linux:

ELSA-2019-3193 Critical: Oracle Linux 7 firefox security update
ELSA-2019-3193 Critical: Oracle Linux 7 firefox security update (aarch64)
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2019-4823)



ELSA-2019-3193 Critical: Oracle Linux 7 firefox security update

Oracle Linux Security Advisory ELSA-2019-3193

http://linux.oracle.com/errata/ELSA-2019-3193.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
firefox-68.2.0-1.0.1.el7_7.i686.rpm
firefox-68.2.0-1.0.1.el7_7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/firefox-68.2.0-1.0.1.el7_7.src.rpm



Description of changes:

[68.2.0-1.0.1]
- Update distribution for Oracle Linux [Orabug: 30143292]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red
Hat file

[68.2.0-1]
- Update to 68.2.0 ESR

[68.1.0-6]
- Enable system nss on RHEL6

ELSA-2019-3193 Critical: Oracle Linux 7 firefox security update (aarch64)

Oracle Linux Security Advisory ELSA-2019-3193

http://linux.oracle.com/errata/ELSA-2019-3193.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

aarch64:
firefox-68.2.0-1.0.1.el7_7.aarch64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/firefox-68.2.0-1.0.1.el7_7.src.rpm



Description of changes:

[68.2.0-1.0.1]
- Update distribution for Oracle Linux [Orabug: 30143292]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red
Hat file

[68.2.0-1]
- Update to 68.2.0 ESR

[68.1.0-6]
- Enable system nss on RHEL6

New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2019-4823)

Synopsis: ELSA-2019-4823 can now be patched using Ksplice
CVEs: CVE-2017-14991 CVE-2017-7495

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2019-4823.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2019-4823.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-7495: Information leak when ext4 ordered data mode is used.

A logic error when flushing data to be written to an ext4 filesystem
could lead to information leak. A local attacker could use this flaw to
read any other files and escalate privileges.

Orabug: 30361860


* Kernel crash in Reliable Datagram Socket RDMA pool management.

A logic error when tracking items in an RDMA pool can result in a reference
count exceeding its maximum limit, leading to a kernel crash.

Orabug: 30397940


* CVE-2017-14991: Information leak in SCSI Generic Support driver.

Failing to initialize buffer when performing ioctl call for /dev/sg0
results in stale kernel data leaked into userspace. This allows local
users to obtain sensitive information about kernel heap memory.

Orabug: 26941755

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.