Updated Linux kernel has been released for both Oracle Linux 6 and 7:
ELSA-2018-4210 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4210 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2018-4210 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4210 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2018-4210 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4210
http://linux.oracle.com/errata/ELSA-2018-4210.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-doc-4.1.12-124.19.1.el6uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.19.1.el6uek.noarch.rpm
kernel-uek-4.1.12-124.19.1.el6uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.19.1.el6uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.19.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.19.1.el6uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-4.1.12-124.19.1.el6uek.src.rpm
Description of changes:
[4.1.12-124.19.1.el6uek]
- x86/entry/64: Ensure %ebx handling correct in xen_failsafe_callback
(George Kennedy) [Orabug: 28402927] {CVE-2018-14678}
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (Andi
Kleen) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM
(Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix off-by-one error when warning that system
has too much RAM (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit
(Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (Sean
Christopherson) [Orabug: 28488808] {CVE-2018-3620}
- x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled
(Guenter Roeck) [Orabug: 28488808] {CVE-2018-3620}
- x86/spectre: Add missing family 6 check to microcode check (Andi
Kleen) [Orabug: 28488808] {CVE-2018-3620}
- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts
disabled (Thomas Gleixner) [Orabug: 28488808] {CVE-2018-3646}
- x86/microcode: Allow late microcode loading with SMT disabled (Josh
Poimboeuf) [Orabug: 28488808] {CVE-2018-3620}
- x86/microcode: Do not upload microcode if CPUs are offline (Ashok Raj)
[Orabug: 28488808] {CVE-2018-3620}
ELSA-2018-4210 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4210
http://linux.oracle.com/errata/ELSA-2018-4210.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-doc-4.1.12-124.19.1.el7uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.19.1.el7uek.noarch.rpm
kernel-uek-4.1.12-124.19.1.el7uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.19.1.el7uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.19.1.el7uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.19.1.el7uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-4.1.12-124.19.1.el7uek.src.rpm
Description of changes:
[4.1.12-124.19.1.el7uek]
- x86/entry/64: Ensure %ebx handling correct in xen_failsafe_callback
(George Kennedy) [Orabug: 28402927] {CVE-2018-14678}
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (Andi
Kleen) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM
(Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix off-by-one error when warning that system
has too much RAM (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit
(Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (Sean
Christopherson) [Orabug: 28488808] {CVE-2018-3620}
- x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled
(Guenter Roeck) [Orabug: 28488808] {CVE-2018-3620}
- x86/spectre: Add missing family 6 check to microcode check (Andi
Kleen) [Orabug: 28488808] {CVE-2018-3620}
- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts
disabled (Thomas Gleixner) [Orabug: 28488808] {CVE-2018-3646}
- x86/microcode: Allow late microcode loading with SMT disabled (Josh
Poimboeuf) [Orabug: 28488808] {CVE-2018-3620}
- x86/microcode: Do not upload microcode if CPUs are offline (Ashok Raj)
[Orabug: 28488808] {CVE-2018-3620}