The following updates has been released for Oracle Linux:
ELBA-2018-4252 Oracle Linux 6 Unbreakable Enterprise kernel bug fix update
ELBA-2018-4252 Oracle Linux 7 Unbreakable Enterprise kernel bug fix update
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update (aarch64)
New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2018-4242):
ELBA-2018-4252 Oracle Linux 6 Unbreakable Enterprise kernel bug fix update
ELBA-2018-4252 Oracle Linux 7 Unbreakable Enterprise kernel bug fix update
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update (aarch64)
New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2018-4242):
ELBA-2018-4252 Oracle Linux 6 Unbreakable Enterprise kernel bug fix update
Oracle Linux Bug Fix Advisory ELBA-2018-4252
http://linux.oracle.com/errata/ELBA-2018-4252.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-doc-4.1.12-124.20.3.el6uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.20.3.el6uek.noarch.rpm
kernel-uek-4.1.12-124.20.3.el6uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.20.3.el6uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.20.3.el6uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.20.3.el6uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-4.1.12-124.20.3.el6uek.src.rpm
Description of changes:
[4.1.12-124.20.3.el6uek]
- x86/bugs/IBRS: properly use the _base ops if IBRS is currently unset
(Zhenzhong Duan) [Orabug: 28782729]
[4.1.12-124.20.2.el6uek]
- hugetlbfs: check for reserve page count going negative (Mike Kravetz)
[Orabug: 28734496]
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike
Kravetz) [Orabug: 28734496]
- mm/hugetlb.c: don't call region_abort if region_chg fails (Mike
Kravetz) [Orabug: 28734496]
- mm: hugetlb: fix hugepage memory leak caused by wrong reserve count
(Naoya Horiguchi) [Orabug: 28734496]
ELBA-2018-4252 Oracle Linux 7 Unbreakable Enterprise kernel bug fix update
Oracle Linux Bug Fix Advisory ELBA-2018-4252
http://linux.oracle.com/errata/ELBA-2018-4252.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-doc-4.1.12-124.20.3.el7uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.20.3.el7uek.noarch.rpm
kernel-uek-4.1.12-124.20.3.el7uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.20.3.el7uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.20.3.el7uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.20.3.el7uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-4.1.12-124.20.3.el7uek.src.rpm
Description of changes:
[4.1.12-124.20.3.el7uek]
- x86/bugs/IBRS: properly use the _base ops if IBRS is currently unset
(Zhenzhong Duan) [Orabug: 28782729]
[4.1.12-124.20.2.el7uek]
- hugetlbfs: check for reserve page count going negative (Mike Kravetz)
[Orabug: 28734496]
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike
Kravetz) [Orabug: 28734496]
- mm/hugetlb.c: don't call region_abort if region_chg fails (Mike
Kravetz) [Orabug: 28734496]
- mm: hugetlb: fix hugepage memory leak caused by wrong reserve count
(Naoya Horiguchi) [Orabug: 28734496]
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update
Oracle Linux Security Advisory ELSA-2018-2918
http://linux.oracle.com/errata/ELSA-2018-2918.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
ghostscript-9.07-29.el7_5.2.i686.rpm
ghostscript-9.07-29.el7_5.2.x86_64.rpm
ghostscript-cups-9.07-29.el7_5.2.x86_64.rpm
ghostscript-devel-9.07-29.el7_5.2.i686.rpm
ghostscript-devel-9.07-29.el7_5.2.x86_64.rpm
ghostscript-doc-9.07-29.el7_5.2.noarch.rpm
ghostscript-gtk-9.07-29.el7_5.2.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/ghostscript-9.07-29.el7_5.2.src.rpm
Description of changes:
[9.07-29.el7_5.2]
- Fix MediaPosition, ManualFeed and MediaType with pxl devices (bug
#1629842)
[9.07-29.el7_5.1]
- Added security fixes for:
- CVE-2018-16509 (bug #1621156)
- CVE-2018-15910 (bug #1621157)
- CVE-2018-16542 (bug #1621380)
[9.07-29]
- Fix rare Segmentation fault when converting PDF to PNG (bug #1473337)
- Raise the default VMThreshold from 1Mb to 8Mb (bug #1479852)
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update (aarch64)
Oracle Linux Security Advisory ELSA-2018-2918
http://linux.oracle.com/errata/ELSA-2018-2918.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
aarch64:
ghostscript-9.07-29.el7_5.2.aarch64.rpm
ghostscript-cups-9.07-29.el7_5.2.aarch64.rpm
ghostscript-devel-9.07-29.el7_5.2.aarch64.rpm
ghostscript-doc-9.07-29.el7_5.2.noarch.rpm
ghostscript-gtk-9.07-29.el7_5.2.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/ghostscript-9.07-29.el7_5.2.src.rpm
Description of changes:
[9.07-29.el7_5.2]
- Fix MediaPosition, ManualFeed and MediaType with pxl devices (bug
#1629842)
[9.07-29.el7_5.1]
- Added security fixes for:
- CVE-2018-16509 (bug #1621156)
- CVE-2018-15910 (bug #1621157)
- CVE-2018-16542 (bug #1621380)
[9.07-29]
- Fix rare Segmentation fault when converting PDF to PNG (bug #1473337)
- Raise the default VMThreshold from 1Mb to 8Mb (bug #1479852)
New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2018-4242):
Synopsis: ELSA-2018-4242 can now be patched using Ksplice
CVEs: CVE-2018-12896 CVE-2018-14678 CVE-2018-16658 CVE-2018-3620 CVE-2018-3646 CVE-2018-7492
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2018-4242.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Incorrect Meltdown vulnerability reporting on Xen paravirtualized guests.
Xen paravirtualized guests get their Meltdown protection from the
hypervisor but this was not reflected correctly in the
/sys/devices/system/cpu/vulnerabilities/meltdown.
Orabug: 28476680
* CVE-2018-12896: Denial-of-service via POSIX timer overflow.
The POSIX timer overrun value can potentially overflow an integer value
if the timer has a sufficiently long interval and expiry time. A
malicious user to create such a timer to cause a denial-of-service.
* Improved fix to CVE-2018-3620, CVE-2018-3646: Information leak in Intel CPUs under terminal fault.
The original fix for L1 Terminal Fault/Foreshadow could prevent loading
of microcode when hyperthreading was disabled or failure to mprotect
specific memory mappings.
* CVE-2018-14678: Privilege escalation in Xen PV guests.
Incorrect register accounting during paravirtualized failsafe callbacks
could result in the use of uninitialized memory and a kernel crash or
potentially escalation of privileges in a paravirtualized guest.
Orabug: 28402921
* CVE-2018-16658: Information leak in CD-ROM status ioctl.
An incorrect bounds check in the CD-ROM driver could allow an
out-of-bounds access and kernel information leak to an unprivileged
user.
Orabug: 28664499
* Device Mapper encrypted target Support middle-endian plain64 IV.
Some encrypted devices store the initialization vector in middle endian
byte ordering and require extra kernel support.
Orabug: 28604629
* CVE-2018-7492: Denial-of-service when setting options for RDS over Infiniband socket.
A missing check when setting RDS_GET_MR option for RDS over Infiniband
socket could lead to a NULL pointer dereference. A local attacker could
use this flaw to cause a denial-of-service.
* Incorrect IBRS firmware protection with IBRS disabled.
Booting a kernel with IBRS disabled would incorrectly use IBRS to
protect against firmware calls when it should have also been disabled.
Orabug: 28610695
* XFS filesystem failure during extended attribute replacement.
Incorrect handling of extended attribute replacement on an XFS
filesystem could result in a filesystem shutdown. A local, unprivileged
user could use this flaw to trigger a denial of service.
Orabug: 28573020
* Kernel hang in AMD Secure Encrypted Virtualization (SEV) encryption.
A race condition in completion code for the AMD CCP device could result
in failure to detect command completion and a kernel hang.
Orabug: 28584386
* Incorrect GID reporting in RoCEv2 RDMA connections.
Incorrect accessors for GIDs could result in failure to return valid
GIDs. This could manifest as connection failures or misleading
reporting.
Orabug: 28607913
* Kernel crash in Reliable Datagram Sockets ARP flushing.
Incorrect locking when flushing ARP entries for Reliable Datagram
Sockets could result in sleeping in an atomic context and triggering a
kernel assertion.
Orabug: 28657397
* Packet loss in Infiniband ACL filtering.
Logic errors in the Infiniband ACL filter logging and counters could
result in incorrectly dropping packets and packet loss.
Orabug: 28655435
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.