Updated kernel and qemu-kvm packages has been released for Oracle Linux 7:
ELSA-2019-2600 Important: Oracle Linux 7 kernel security and bug fix update
ELSA-2019-2607 Low: Oracle Linux 7 qemu-kvm security update
ELSA-2019-2600 Important: Oracle Linux 7 kernel security and bug fix update
ELSA-2019-2607 Low: Oracle Linux 7 qemu-kvm security update
ELSA-2019-2600 Important: Oracle Linux 7 kernel security and bug fix update
Oracle Linux Security Advisory ELSA-2019-2600
http://linux.oracle.com/errata/ELSA-2019-2600.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
bpftool-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1062.1.1.el7.noarch.rpm
kernel-debug-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-devel-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-doc-3.10.0-1062.1.1.el7.noarch.rpm
kernel-headers-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-tools-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1062.1.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1062.1.1.el7.x86_64.rpm
perf-3.10.0-1062.1.1.el7.x86_64.rpm
python-perf-3.10.0-1062.1.1.el7.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-3.10.0-1062.1.1.el7.src.rpm
Description of changes:
[3.10.0-1062.1.1.el7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel
(olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
[3.10.0-1062.1.1.el7]
- [fs] nfsv4.1: Avoid false retries when RPC calls are interrupted
(Benjamin Coddington) [1739077 1732427]
- [fs] NFS4.1 handle interrupted slot reuse from ERR_DELAY (Benjamin
Coddington) [1739077 1732427]
- [fs] nfsv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY
(Benjamin Coddington) [1739077 1732427]
- [fs] cifs: fix panic in smb2_reconnect (Leif Sahlberg) [1737382 1702264]
- [scsi] sg: protect against races between mmap() and
SG_SET_RESERVED_SIZE (Ewan Milne) [1737380 1710533]
- [scsi] sg: recheck MMAP_IO request length with lock held (Ewan Milne)
[1737380 1710533]
- [scsi] sg: reset 'res_in_use' after unlinking reserved array (Ewan
Milne) [1737380 1710533]
- [scsi] sg: protect accesses to 'reserved' page array (Ewan Milne)
[1737380 1710533]
- [netdrv] mlx4/en_netdev: allow offloading VXLAN over VLAN (Paolo
Abeni) [1734333 1733671]
- [netdrv] brcmfmac: assure SSID length from firmware is limited
(Stanislaw Gruszka) [1704879 1704880] {CVE-2019-9500}
- [net] tcp: be more careful in tcp_fragment() (Marcelo Leitner)
[1739130 1732106]
- [documentation] Documentation: Add swapgs description to the Spectre
v1 documentation (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [documentation] Documentation: Add section about CPU vulnerabilities
for Spectre (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/speculation/swapgs: Exclude ATOMs from speculation through
SWAPGS (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/speculation: Enable Spectre v1 swapgs mitigations (Waiman
Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/speculation: Prepare entry code for Spectre v1 swapgs
mitigations (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/feature: Relocate X86_FEATURE_INVPCID_SINGLE (Waiman Long)
[1729810 1724510] {CVE-2019-1125}
ELSA-2019-2607 Low: Oracle Linux 7 qemu-kvm security update
Oracle Linux Security Advisory ELSA-2019-2607
http://linux.oracle.com/errata/ELSA-2019-2607.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
qemu-img-1.5.3-167.el7_7.1.x86_64.rpm
qemu-kvm-1.5.3-167.el7_7.1.x86_64.rpm
qemu-kvm-common-1.5.3-167.el7_7.1.x86_64.rpm
qemu-kvm-tools-1.5.3-167.el7_7.1.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/qemu-kvm-1.5.3-167.el7_7.1.src.rpm
Description of changes:
[1.5.3-167.el7_7.1]
- kvm-qxl-check-release-info-object.patch [bz#1732337]
- kvm-Fix-heap-overflow-in-ip_reass-on-big-packet-input.patch [bz#1734748]
- Resolves: bz#1732337
(CVE-2019-12155 qemu-kvm: QEMU: qxl: null pointer dereference while
releasing spice resources [rhel-7] [rhel-7.7.z])
- Resolves: bz#1734748
(CVE-2019-14378 qemu-kvm: QEMU: slirp: heap buffer overflow during
packet reassembly [rhel-7.7.z])