Oracle Linux 6264 Published by

The following updates has been released for Oracle Linux:

ELSA-2019-0022 Important: Oracle Linux 7 keepalived security update
ELSA-2019-4316 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2019-4316 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELBA-2019-4314)



ELSA-2019-0022 Important: Oracle Linux 7 keepalived security update

Oracle Linux Security Advisory ELSA-2019-0022

http://linux.oracle.com/errata/ELSA-2019-0022.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
keepalived-1.3.5-8.el7_6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/keepalived-1.3.5-8.el7_6.src.rpm



Description of changes:

[1.3.5-8]
- Fixed patch that was incorrectly removed (#1652694)

[1.3.5-7]
- Fix buffer overflow when parsing HTTP status codes (#1652694)

ELSA-2019-4316 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2019-4316

http://linux.oracle.com/errata/ELSA-2019-4316.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-firmware-3.8.13-118.29.1.el6uek.noarch.rpm
kernel-uek-doc-3.8.13-118.29.1.el6uek.noarch.rpm
kernel-uek-3.8.13-118.29.1.el6uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.29.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.29.1.el6uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.29.1.el6uek.x86_64.rpm
dtrace-modules-3.8.13-118.29.1.el6uek-0.4.5-3.el6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-3.8.13-118.29.1.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/dtrace-modules-3.8.13-118.29.1.el6uek-0.4.5-3.el6.src.rpm



Description of changes:

kernel-uek
[3.8.13-118.29.1.el6uek]
- Copy secure_boot flag in boot params across kexec reboot (Dave Young)
[Orabug: 22066352] {CVE-2015-7837}
- ipv6: tcp: add rcu locking in tcp_v6_send_synack() (Eric Dumazet)
[Orabug: 25059183] {CVE-2016-3841}
- ipv6: add complete rcu protection around np->opt (Eric Dumazet)
[Orabug: 25059183] {CVE-2016-3841}
- scsi: qla2xxx: Fix an integer overflow in sysfs code (Dan Carpenter)
[Orabug: 28220420] {CVE-2017-14051}
- ext4: fail ext4_iget for root directory if unallocated (Theodore Ts'o)
[Orabug: 28220433] {CVE-2018-1092} {CVE-2018-1092}
- certs: Add Oracle's new X509 cert into the kernel keyring (Eric
Snowberg) [Orabug: 28926205] - ALSA: seq: Fix regression by incorrect
ioctl_mutex usages (Takashi Iwai) [Orabug: 29005190] {CVE-2018-1000004}
- netfilter: xt_osf: Add missing permission checks (Kevin Cernekee)
[Orabug: 29037832] {CVE-2017-17450}
- wil6210: missing length check in wmi_set_ie (Lior David) [Orabug:
29060697] {CVE-2018-5848}
- HID: debug: check length before copy_to_user() (Daniel Rosenberg)
[Orabug: 29128167] {CVE-2018-9516}
- x86/MCE: Serialize sysfs changes (Seunghun Han) [Orabug: 29152249]
{CVE-2018-7995}
- Input: i8042 - fix crash at boot time (Chen Hong) [Orabug: 29152329]
{CVE-2017-18079}

ELSA-2019-4316 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2019-4316

http://linux.oracle.com/errata/ELSA-2019-4316.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-firmware-3.8.13-118.29.1.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-118.29.1.el7uek.noarch.rpm
kernel-uek-3.8.13-118.29.1.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.29.1.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.29.1.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.29.1.el7uek.x86_64.rpm
dtrace-modules-3.8.13-118.29.1.el7uek-0.4.5-3.el7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-118.29.1.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-118.29.1.el7uek-0.4.5-3.el7.src.rpm



Description of changes:

kernel-uek
[3.8.13-118.29.1.el7uek]
- Copy secure_boot flag in boot params across kexec reboot (Dave Young)
[Orabug: 22066352] {CVE-2015-7837}
- ipv6: tcp: add rcu locking in tcp_v6_send_synack() (Eric Dumazet)
[Orabug: 25059183] {CVE-2016-3841}
- ipv6: add complete rcu protection around np->opt (Eric Dumazet)
[Orabug: 25059183] {CVE-2016-3841}
- scsi: qla2xxx: Fix an integer overflow in sysfs code (Dan Carpenter)
[Orabug: 28220420] {CVE-2017-14051}
- ext4: fail ext4_iget for root directory if unallocated (Theodore Ts'o)
[Orabug: 28220433] {CVE-2018-1092} {CVE-2018-1092}
- certs: Add Oracle's new X509 cert into the kernel keyring (Eric
Snowberg) [Orabug: 28926205] - ALSA: seq: Fix regression by incorrect
ioctl_mutex usages (Takashi Iwai) [Orabug: 29005190] {CVE-2018-1000004}
- netfilter: xt_osf: Add missing permission checks (Kevin Cernekee)
[Orabug: 29037832] {CVE-2017-17450}
- wil6210: missing length check in wmi_set_ie (Lior David) [Orabug:
29060697] {CVE-2018-5848}
- HID: debug: check length before copy_to_user() (Daniel Rosenberg)
[Orabug: 29128167] {CVE-2018-9516}
- x86/MCE: Serialize sysfs changes (Seunghun Han) [Orabug: 29152249]
{CVE-2018-7995}
- Input: i8042 - fix crash at boot time (Chen Hong) [Orabug: 29152329]
{CVE-2017-18079}


New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELBA-2019-4314)

Synopsis: ELBA-2019-4314 can now be patched using Ksplice
CVEs: CVE-2017-17450 CVE-2018-5848

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Bug Fix Advisory, ELBA-2019-4314.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Kernel crash in Huge TLB mappings during page migration.

A race condition when migrating shared Huge TLB mappings or offlining a
huge page could result in memory corruption or a failing kernel
assertion resulting in a kernel crash.

Orabug: 28951854


* Kernel crash during Huge TLB page faults and truncation.

A race condition in Huge TLB page fault and truncation handling could
result in memory corruption or triggering a kernel assertion, leading to
a kernel crash.

Orabug: 28896255


* CVE-2017-17450: Unprivileged access to netlink namespaces.

A missing permission check in the netfilter xt_osf code allows an
unprivileged user to create user and net namespaces without the proper
permissions.

Orabug: 29037831


* CVE-2018-5848: Privilege escalation in the Wilocity Atheros driver.

Improper length validation could lead to integer overflow and undefined
behaviour. A local user could use this flaw to cause a memory corruption
and potentially escalate privileges.

Orabug: 28951265


* NULL pointer dereference during iSCSI connection reset.

A missing check when resetting an iSCSI connection which is already terminating
can result in a NULL pointer dereference, leading to a kernel crash.

Orabug: 28946207


* Improved fix to Denial-of-service when hot-removing memory on missing sections.

A logic error in the routine checking the pages in a memory zone could lead
to a kernel crash when offlining memory. A local, privileged user could
use this flaw to cause a denial-of-service.

Orabug: 29050538


* Denial-of-service when accessing valid_zones sysfs entry.

A logic error when reading valid_zones sysfs entry on a system with more
than 64GB of memory could lead to a kernel panic. A local attacker could
use this flaw to cause a denial-of-service.

Orabug: 29050538


* Address loss in ibacm during RDS failback.

Incorrect failover handling could result in confusion for ibacm when
performing failback.

Orabug: 28860366

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.