Oracle Linux 6265 Published by

The following updates has been released for Oracle Linux:

ELBA-2018-4252 Oracle Linux 6 Unbreakable Enterprise kernel bug fix update
ELBA-2018-4252 Oracle Linux 7 Unbreakable Enterprise kernel bug fix update
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update
ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update (aarch64)
New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2018-4242):



ELBA-2018-4252 Oracle Linux 6 Unbreakable Enterprise kernel bug fix update

Oracle Linux Bug Fix Advisory ELBA-2018-4252

http://linux.oracle.com/errata/ELBA-2018-4252.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-doc-4.1.12-124.20.3.el6uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.20.3.el6uek.noarch.rpm
kernel-uek-4.1.12-124.20.3.el6uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.20.3.el6uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.20.3.el6uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.20.3.el6uek.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-4.1.12-124.20.3.el6uek.src.rpm



Description of changes:

[4.1.12-124.20.3.el6uek]
- x86/bugs/IBRS: properly use the _base ops if IBRS is currently unset
(Zhenzhong Duan) [Orabug: 28782729]

[4.1.12-124.20.2.el6uek]
- hugetlbfs: check for reserve page count going negative (Mike Kravetz)
[Orabug: 28734496]
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike
Kravetz) [Orabug: 28734496]
- mm/hugetlb.c: don't call region_abort if region_chg fails (Mike
Kravetz) [Orabug: 28734496]
- mm: hugetlb: fix hugepage memory leak caused by wrong reserve count
(Naoya Horiguchi) [Orabug: 28734496]


ELBA-2018-4252 Oracle Linux 7 Unbreakable Enterprise kernel bug fix update

Oracle Linux Bug Fix Advisory ELBA-2018-4252

http://linux.oracle.com/errata/ELBA-2018-4252.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-doc-4.1.12-124.20.3.el7uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.20.3.el7uek.noarch.rpm
kernel-uek-4.1.12-124.20.3.el7uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.20.3.el7uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.20.3.el7uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.20.3.el7uek.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-4.1.12-124.20.3.el7uek.src.rpm



Description of changes:

[4.1.12-124.20.3.el7uek]
- x86/bugs/IBRS: properly use the _base ops if IBRS is currently unset
(Zhenzhong Duan) [Orabug: 28782729]

[4.1.12-124.20.2.el7uek]
- hugetlbfs: check for reserve page count going negative (Mike Kravetz)
[Orabug: 28734496]
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike
Kravetz) [Orabug: 28734496]
- mm/hugetlb.c: don't call region_abort if region_chg fails (Mike
Kravetz) [Orabug: 28734496]
- mm: hugetlb: fix hugepage memory leak caused by wrong reserve count
(Naoya Horiguchi) [Orabug: 28734496]


ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update

Oracle Linux Security Advisory ELSA-2018-2918

http://linux.oracle.com/errata/ELSA-2018-2918.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
ghostscript-9.07-29.el7_5.2.i686.rpm
ghostscript-9.07-29.el7_5.2.x86_64.rpm
ghostscript-cups-9.07-29.el7_5.2.x86_64.rpm
ghostscript-devel-9.07-29.el7_5.2.i686.rpm
ghostscript-devel-9.07-29.el7_5.2.x86_64.rpm
ghostscript-doc-9.07-29.el7_5.2.noarch.rpm
ghostscript-gtk-9.07-29.el7_5.2.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/ghostscript-9.07-29.el7_5.2.src.rpm



Description of changes:

[9.07-29.el7_5.2]
- Fix MediaPosition, ManualFeed and MediaType with pxl devices (bug
#1629842)

[9.07-29.el7_5.1]
- Added security fixes for:
- CVE-2018-16509 (bug #1621156)
- CVE-2018-15910 (bug #1621157)
- CVE-2018-16542 (bug #1621380)

[9.07-29]
- Fix rare Segmentation fault when converting PDF to PNG (bug #1473337)
- Raise the default VMThreshold from 1Mb to 8Mb (bug #1479852)


ELSA-2018-2918 Important: Oracle Linux 7 ghostscript security update (aarch64)

Oracle Linux Security Advisory ELSA-2018-2918

http://linux.oracle.com/errata/ELSA-2018-2918.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

aarch64:
ghostscript-9.07-29.el7_5.2.aarch64.rpm
ghostscript-cups-9.07-29.el7_5.2.aarch64.rpm
ghostscript-devel-9.07-29.el7_5.2.aarch64.rpm
ghostscript-doc-9.07-29.el7_5.2.noarch.rpm
ghostscript-gtk-9.07-29.el7_5.2.aarch64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/ghostscript-9.07-29.el7_5.2.src.rpm



Description of changes:

[9.07-29.el7_5.2]
- Fix MediaPosition, ManualFeed and MediaType with pxl devices (bug
#1629842)

[9.07-29.el7_5.1]
- Added security fixes for:
- CVE-2018-16509 (bug #1621156)
- CVE-2018-15910 (bug #1621157)
- CVE-2018-16542 (bug #1621380)

[9.07-29]
- Fix rare Segmentation fault when converting PDF to PNG (bug #1473337)
- Raise the default VMThreshold from 1Mb to 8Mb (bug #1479852)


New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2018-4242):

Synopsis: ELSA-2018-4242 can now be patched using Ksplice
CVEs: CVE-2018-12896 CVE-2018-14678 CVE-2018-16658 CVE-2018-3620 CVE-2018-3646 CVE-2018-7492

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2018-4242.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Incorrect Meltdown vulnerability reporting on Xen paravirtualized guests.

Xen paravirtualized guests get their Meltdown protection from the
hypervisor but this was not reflected correctly in the
/sys/devices/system/cpu/vulnerabilities/meltdown.

Orabug: 28476680


* CVE-2018-12896: Denial-of-service via POSIX timer overflow.

The POSIX timer overrun value can potentially overflow an integer value
if the timer has a sufficiently long interval and expiry time. A
malicious user to create such a timer to cause a denial-of-service.


* Improved fix to CVE-2018-3620, CVE-2018-3646: Information leak in Intel CPUs under terminal fault.

The original fix for L1 Terminal Fault/Foreshadow could prevent loading
of microcode when hyperthreading was disabled or failure to mprotect
specific memory mappings.


* CVE-2018-14678: Privilege escalation in Xen PV guests.

Incorrect register accounting during paravirtualized failsafe callbacks
could result in the use of uninitialized memory and a kernel crash or
potentially escalation of privileges in a paravirtualized guest.

Orabug: 28402921


* CVE-2018-16658: Information leak in CD-ROM status ioctl.

An incorrect bounds check in the CD-ROM driver could allow an
out-of-bounds access and kernel information leak to an unprivileged
user.

Orabug: 28664499


* Device Mapper encrypted target Support middle-endian plain64 IV.

Some encrypted devices store the initialization vector in middle endian
byte ordering and require extra kernel support.

Orabug: 28604629


* CVE-2018-7492: Denial-of-service when setting options for RDS over Infiniband socket.

A missing check when setting RDS_GET_MR option for RDS over Infiniband
socket could lead to a NULL pointer dereference. A local attacker could
use this flaw to cause a denial-of-service.


* Incorrect IBRS firmware protection with IBRS disabled.

Booting a kernel with IBRS disabled would incorrectly use IBRS to
protect against firmware calls when it should have also been disabled.

Orabug: 28610695


* XFS filesystem failure during extended attribute replacement.

Incorrect handling of extended attribute replacement on an XFS
filesystem could result in a filesystem shutdown. A local, unprivileged
user could use this flaw to trigger a denial of service.

Orabug: 28573020


* Kernel hang in AMD Secure Encrypted Virtualization (SEV) encryption.

A race condition in completion code for the AMD CCP device could result
in failure to detect command completion and a kernel hang.

Orabug: 28584386


* Incorrect GID reporting in RoCEv2 RDMA connections.

Incorrect accessors for GIDs could result in failure to return valid
GIDs. This could manifest as connection failures or misleading
reporting.

Orabug: 28607913


* Kernel crash in Reliable Datagram Sockets ARP flushing.

Incorrect locking when flushing ARP entries for Reliable Datagram
Sockets could result in sleeping in an atomic context and triggering a
kernel assertion.

Orabug: 28657397


* Packet loss in Infiniband ACL filtering.

Logic errors in the Infiniband ACL filter logging and counters could
result in incorrectly dropping packets and packet loss.

Orabug: 28655435

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.