The following updates has been released for Oracle Linux:
ELBA-2019-2891 Oracle Linux 6 java-1.7.0-openjdk bug fix update
ELSA-2019-2892 Important: Oracle Linux 6 qemu-kvm security update
ELSA-2019-2893 Important: Oracle Linux 8 httpd:2.4 security update
ELBA-2019-2891 Oracle Linux 6 java-1.7.0-openjdk bug fix update
ELSA-2019-2892 Important: Oracle Linux 6 qemu-kvm security update
ELSA-2019-2893 Important: Oracle Linux 8 httpd:2.4 security update
ELBA-2019-2891 Oracle Linux 6 java-1.7.0-openjdk bug fix update
Oracle Linux Bug Fix Advisory ELBA-2019-2891
http://linux.oracle.com/errata/ELBA-2019-2891.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
java-1.7.0-openjdk-1.7.0.231-2.6.19.2.0.1.el6_10.i686.rpm
java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.2.0.1.el6_10.i686.rpm
java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.2.0.1.el6_10.i686.rpm
java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.2.0.1.el6_10.noarch.rpm
java-1.7.0-openjdk-src-1.7.0.231-2.6.19.2.0.1.el6_10.i686.rpm
x86_64:
java-1.7.0-openjdk-1.7.0.231-2.6.19.2.0.1.el6_10.x86_64.rpm
java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.2.0.1.el6_10.x86_64.rpm
java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.2.0.1.el6_10.x86_64.rpm
java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.2.0.1.el6_10.noarch.rpm
java-1.7.0-openjdk-src-1.7.0.231-2.6.19.2.0.1.el6_10.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/java-1.7.0-openjdk-1.7.0.231-2.6.19.2.0.1.el6_10.src.rpm
Description of changes:
[1:1.7.0.231-2.6.19.2.0.1]
- Update DISTRO_NAME in specfile
[1:1.7.0.231-2.6.19.2]
- Fix crash in Class.forName0
- Resolves: rhbz#1698274
ELSA-2019-2892 Important: Oracle Linux 6 qemu-kvm security update
Oracle Linux Security Advisory ELSA-2019-2892
http://linux.oracle.com/errata/ELSA-2019-2892.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
qemu-guest-agent-0.12.1.2-2.506.el6_10.5.i686.rpm
x86_64:
qemu-guest-agent-0.12.1.2-2.506.el6_10.5.x86_64.rpm
qemu-img-0.12.1.2-2.506.el6_10.5.x86_64.rpm
qemu-kvm-0.12.1.2-2.506.el6_10.5.x86_64.rpm
qemu-kvm-tools-0.12.1.2-2.506.el6_10.5.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/qemu-kvm-0.12.1.2-2.506.el6_10.5.src.rpm
Description of changes:
[0.12.1.2-2.506.el6_10.5]
- kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch
[bz#1669066]
- kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch
[bz#1669066]
- kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1669066]
- kvm-qxl-check-release-info-object.patch [bz#1712728]
- kvm-net-Use-iov-helper-functions.patch [bz#1636415]
- kvm-net-increase-buffer-size-to-accommodate-Jumbo-frame-.patch
[bz#1636415]
- kvm-net-ignore-packet-size-greater-than-INT_MAX.patch [bz#1636415]
- kvm-net-drop-too-large-packet-early.patch [bz#1636415]
- kvm-PATCH-slirp-fix-buffer-overrun.patch [bz#1586251]
- kvm-Fix-build-from-previous-commit.patch [bz#1586251]
- kvm-slirp-remove-mbuf-m_hdr-m_dat-indirection.patch [bz#1586251]
- kvm-slirp-Convert-mbufs-to-use-g_malloc-and-g_free.patch [bz#1586251]
- kvm-slirp-correct-size-computation-while-concatenating-m.patch
[bz#1586251]
- kvm-pcnet-fix-possible-buffer-overflow.patch [bz#1636774]
- Resolves: bz#1586251
(CVE-2018-11806 qemu-kvm: QEMU: slirp: heap buffer overflow while
reassembling fragmented datagrams [rhel-6.10.z])
- Resolves: bz#1636415
(CVE-2018-10839 qemu-kvm: Qemu: ne2000: integer overflow leads to
buffer overflow issue [rhel-6])
- Resolves: bz#1636774
(CVE-2018-17962 qemu-kvm: Qemu: pcnet: integer overflow leads to
buffer overflow [rhel-6])
- Resolves: bz#1669066
(CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in
tcp_emu() [rhel-6.10.z])
- Resolves: bz#1712728
(CVE-2019-12155 qemu-kvm: QEMU: qxl: null pointer dereference while
releasing spice resources [rhel-6])
ELSA-2019-2893 Important: Oracle Linux 8 httpd:2.4 security update
Oracle Linux Security Advisory ELSA-2019-2893
http://linux.oracle.com/errata/ELSA-2019-2893.html
The following updated rpms for Oracle Linux 8 have been uploaded to the
Unbreakable Linux Network:
x86_64:
httpd-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
httpd-devel-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
httpd-filesystem-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.noarch.rpm
httpd-manual-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.noarch.rpm
httpd-tools-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
mod_http2-1.11.3-3.module+el8.0.0+5348+de75177e.x86_64.rpm
mod_ldap-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
mod_md-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
mod_proxy_html-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
mod_session-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
mod_ssl-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.x86_64.rpm
aarch64:
httpd-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
httpd-devel-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
httpd-filesystem-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.noarch.rpm
httpd-manual-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.noarch.rpm
httpd-tools-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
mod_http2-1.11.3-3.module+el8.0.0+5348+de75177e.aarch64.rpm
mod_ldap-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
mod_md-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
mod_proxy_html-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
mod_session-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
mod_ssl-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/httpd-2.4.37-12.0.1.module+el8.0.0+5348+de75177e.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates/mod_http2-1.11.3-3.module+el8.0.0+5348+de75177e.src.rpm
Description of changes:
httpd
[2.4.37-12.0.1]
- Set vstring per ORACLE_SUPPORT_PRODUCT [Orabug: 29892262]
- Replace index.html with Oracle's index page oracle_index.html
[2.4.37-12]
- Resolves: #1744997 - CVE-2019-9511 httpd:2.4/mod_http2: HTTP/2: large
amount
of data request leads to denial of service
- Resolves: #1745084 - CVE-2019-9516 httpd:2.4/mod_http2: HTTP/2: 0-length
headers leads to denial of service
- Resolves: #1745152 - CVE-2019-9517 httpd:2.4/mod_http2: HTTP/2: request
for large response leads to denial of service
mod_http2
[1.11.3-3]
- Resolves: #1744997 - CVE-2019-9511 httpd:2.4/mod_http2: HTTP/2: large
amount
of data request leads to denial of service
- Resolves: #1745084 - CVE-2019-9516 httpd:2.4/mod_http2: HTTP/2: 0-length
headers leads to denial of service
- Resolves: #1745152 - CVE-2019-9517 httpd:2.4/mod_http2: HTTP/2: request
for large response leads to denial of service