The following kernel updates has been released for Oracle Linux:
ELSA-2018-4087 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4087 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2018-4088 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update
ELSA-2018-4088 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4087 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4087 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2018-4088 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update
ELSA-2018-4088 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4087 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4087
http://linux.oracle.com/errata/ELSA-2018-4087.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-doc-4.1.12-124.14.3.el6uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.14.3.el6uek.noarch.rpm
kernel-uek-4.1.12-124.14.3.el6uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.14.3.el6uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.14.3.el6uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.14.3.el6uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-4.1.12-124.14.3.el6uek.src.rpm
Description of changes:
[4.1.12-124.14.3.el6uek]
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (Linus
Torvalds) [Orabug: 27947602] {CVE-2018-100199}
ELSA-2018-4087 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4087
http://linux.oracle.com/errata/ELSA-2018-4087.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-doc-4.1.12-124.14.3.el7uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.14.3.el7uek.noarch.rpm
kernel-uek-4.1.12-124.14.3.el7uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.14.3.el7uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.14.3.el7uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.14.3.el7uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-4.1.12-124.14.3.el7uek.src.rpm
Description of changes:
[4.1.12-124.14.3.el7uek]
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (Linus
Torvalds) [Orabug: 27947602] {CVE-2018-100199}
ELSA-2018-4088 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4088
http://linux.oracle.com/errata/ELSA-2018-4088.html
The following updated rpms for Oracle Linux 5 Extended Lifecycle Support
(ELS) have been uploaded to the Unbreakable Linux Network:
i386:
kernel-uek-2.6.39-400.298.6.el5uek.i686.rpm
kernel-uek-debug-2.6.39-400.298.6.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.298.6.el5uek.i686.rpm
kernel-uek-devel-2.6.39-400.298.6.el5uek.i686.rpm
kernel-uek-doc-2.6.39-400.298.6.el5uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.298.6.el5uek.noarch.rpm
x86_64:
kernel-uek-firmware-2.6.39-400.298.6.el5uek.noarch.rpm
kernel-uek-doc-2.6.39-400.298.6.el5uek.noarch.rpm
kernel-uek-2.6.39-400.298.6.el5uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.298.6.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.298.6.el5uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.298.6.el5uek.x86_64.rpm
Description of changes:
[2.6.39-400.298.6.el5uek]
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (Linus
Torvalds) [Orabug: 27947612] {CVE-2018-100199}
[2.6.39-400.298.5.el5uek]
- xen-netfront: fix rx stall when req_prod_pvt goes back to more than
zero again (Dongli Zhang) [Orabug: 25053376]
- x86/IBRS: Remove support for IBRS_ENABLED_USER mode (Boris Ostrovsky)
[Orabug: 27430615]
- x86/microcode/intel: Disable late loading on model 79 (Borislav
Petkov) [Orabug: 27343579]
[2.6.39-400.298.4.el5uek]
- ALSA: usb-audio: Kill stray URB at exiting (Takashi Iwai) [Orabug:
27148283] {CVE-2017-16527}
- uwb: properly check kthread_run return value (Andrey Konovalov)
[Orabug: 27206900] {CVE-2017-16526}
- HID: usbhid: fix out-of-bounds bug (Jaejoong Kim) [Orabug: 27207935]
{CVE-2017-16533}
- cx231xx-cards: fix NULL-deref on missing association descriptor (Johan
Hovold) [Orabug: 27208080] {CVE-2017-16536}
- net: cdc_ether: fix divide by 0 on bad descriptors (Bjørn Mork)
[Orabug: 27215206] {CVE-2017-16649}
- Bluetooth: bnep: bnep_add_connection() should verify that it's dealing
with l2cap socket (Al Viro) [Orabug: 27344787] {CVE-2017-15868}
- Bluetooth: hidp: verify l2cap sockets (David Herrmann) [Orabug:
27344787] {CVE-2017-15868}
- ALSA: pcm: prevent UAF in snd_pcm_info (Robb Glasser) [Orabug:
27344840] {CVE-2017-0861} {CVE-2017-0861}
- Addendum: x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early
Spectre v2 microcodes (David Woodhouse) [Orabug: 27516441]
- x86/cpufeature: Add X86_FEATURE_IA32_ARCH_CAPS and
X86_FEATURE_IBRS_ATT (David Woodhouse) [Orabug: 27649498] {CVE-2017-5715}
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (David
Woodhouse) [Orabug: 27649510] {CVE-2017-5715}
- x86/spectre: Now that we expose 'stbibp' make sure it is correct.
(Konrad Rzeszutek Wilk) [Orabug: 27649631] {CVE-2017-5715}
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier)
support (KarimAllah Ahmed) [Orabug: 27649640] {CVE-2017-5715}
- x86: Add STIBP feature enumeration (David Woodhouse) [Orabug:
27649693] {CVE-2017-5715}
- x86/cpu/AMD: Add speculative control support for AMD (Tom Lendacky)
[Orabug: 27649706] {CVE-2017-5715}
- x86/spectre_v2: Don't spam the console with these: (Konrad Rzeszutek
Wilk) [Orabug: 27649723] {CVE-2017-5715}
- x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes (Darren Kenny)
[Orabug: 27600848]
- Revert "x86/spec_ctrl: Add 'nolfence' knob to disable fallback for
spectre_v2 mitigation" (Konrad Rzeszutek Wilk) [Orabug: 27601773]
- x86/syscall: run syscall exit code with extra registers cleared
(Alexandre Chartre) [Orabug: 27501176]
- x86/syscall: run syscall-specific code with extra registers cleared
(Alexandre Chartre) [Orabug: 27501176]
- x86/syscall: run syscall entry code with extra registers cleared
(Alexandre Chartre) [Orabug: 27501176]
- x86/spectre: Drop the warning about ibrs being obsolete (Konrad
Rzeszutek Wilk) [Orabug: 27518974]
- x86: Include linux/device.h in bugs_64.c (Boris Ostrovsky) [Orabug:
27519044]
- x86: fix mitigation details of UEK2 spectre v1 (Konrad Rzeszutek Wilk)
[Orabug: 27509909]
- x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2
microcodes (David Woodhouse) [Orabug: 27516441] {CVE-2017-5715}
- x86, intel: Output microcode revision in /proc/cpuinfo (Andi Kleen)
[Orabug: 27516441]
- x86: intel-family.h: Add GEMINI_LAKE SOC (Len Brown) [Orabug: 27516441]
- x86/cpu/intel: Introduce macros for Intel family numbers (Dave Hansen)
[Orabug: 27516441]
- x86/mitigation/spectre_v2: Add reporting of 'lfence' (Konrad Rzeszutek
Wilk) [Orabug: 27525958]
- x86/spec: Add 'lfence_enabled' in sysfs (Konrad Rzeszutek Wilk)
[Orabug: 27525954]
- x86/spec_ctrl: Add 'nolfence' knob to disable fallback for spectre_v2
mitigation (Konrad Rzeszutek Wilk) [Orabug: 27525923]
- x86/spec: Also print IBRS if IBPB is disabled (Konrad Rzeszutek Wilk)
[Orabug: 27519083]
- x86: Use Indirect Branch Prediction Barrier in context switch (Tim
Chen) [Orabug: 27516378]
ELSA-2018-4088 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2018-4088
http://linux.oracle.com/errata/ELSA-2018-4088.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-2.6.39-400.298.6.el6uek.i686.rpm
kernel-uek-debug-2.6.39-400.298.6.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.298.6.el6uek.i686.rpm
kernel-uek-devel-2.6.39-400.298.6.el6uek.i686.rpm
kernel-uek-doc-2.6.39-400.298.6.el6uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.298.6.el6uek.noarch.rpm
x86_64:
kernel-uek-firmware-2.6.39-400.298.6.el6uek.noarch.rpm
kernel-uek-doc-2.6.39-400.298.6.el6uek.noarch.rpm
kernel-uek-2.6.39-400.298.6.el6uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.298.6.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.298.6.el6uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.298.6.el6uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.39-400.298.6.el6uek.src.rpm
Description of changes:
[2.6.39-400.298.6.el6uek]
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (Linus
Torvalds) [Orabug: 27947612] {CVE-2018-100199}
[2.6.39-400.298.5.el6uek]
- xen-netfront: fix rx stall when req_prod_pvt goes back to more than
zero again (Dongli Zhang) [Orabug: 25053376]
- x86/IBRS: Remove support for IBRS_ENABLED_USER mode (Boris Ostrovsky)
[Orabug: 27430615]
- x86/microcode/intel: Disable late loading on model 79 (Borislav
Petkov) [Orabug: 27343579]
[2.6.39-400.298.4.el6uek]
- ALSA: usb-audio: Kill stray URB at exiting (Takashi Iwai) [Orabug:
27148283] {CVE-2017-16527}
- uwb: properly check kthread_run return value (Andrey Konovalov)
[Orabug: 27206900] {CVE-2017-16526}
- HID: usbhid: fix out-of-bounds bug (Jaejoong Kim) [Orabug: 27207935]
{CVE-2017-16533}
- cx231xx-cards: fix NULL-deref on missing association descriptor (Johan
Hovold) [Orabug: 27208080] {CVE-2017-16536}
- net: cdc_ether: fix divide by 0 on bad descriptors (Bjørn Mork)
[Orabug: 27215206] {CVE-2017-16649}
- Bluetooth: bnep: bnep_add_connection() should verify that it's dealing
with l2cap socket (Al Viro) [Orabug: 27344787] {CVE-2017-15868}
- Bluetooth: hidp: verify l2cap sockets (David Herrmann) [Orabug:
27344787] {CVE-2017-15868}
- ALSA: pcm: prevent UAF in snd_pcm_info (Robb Glasser) [Orabug:
27344840] {CVE-2017-0861} {CVE-2017-0861}
- Addendum: x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early
Spectre v2 microcodes (David Woodhouse) [Orabug: 27516441]
- x86/cpufeature: Add X86_FEATURE_IA32_ARCH_CAPS and
X86_FEATURE_IBRS_ATT (David Woodhouse) [Orabug: 27649498] {CVE-2017-5715}
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (David
Woodhouse) [Orabug: 27649510] {CVE-2017-5715}
- x86/spectre: Now that we expose 'stbibp' make sure it is correct.
(Konrad Rzeszutek Wilk) [Orabug: 27649631] {CVE-2017-5715}
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier)
support (KarimAllah Ahmed) [Orabug: 27649640] {CVE-2017-5715}
- x86: Add STIBP feature enumeration (David Woodhouse) [Orabug:
27649693] {CVE-2017-5715}
- x86/cpu/AMD: Add speculative control support for AMD (Tom Lendacky)
[Orabug: 27649706] {CVE-2017-5715}
- x86/spectre_v2: Don't spam the console with these: (Konrad Rzeszutek
Wilk) [Orabug: 27649723] {CVE-2017-5715}
- x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes (Darren Kenny)
[Orabug: 27600848]
- Revert "x86/spec_ctrl: Add 'nolfence' knob to disable fallback for
spectre_v2 mitigation" (Konrad Rzeszutek Wilk) [Orabug: 27601773]
- x86/syscall: run syscall exit code with extra registers cleared
(Alexandre Chartre) [Orabug: 27501176]
- x86/syscall: run syscall-specific code with extra registers cleared
(Alexandre Chartre) [Orabug: 27501176]
- x86/syscall: run syscall entry code with extra registers cleared
(Alexandre Chartre) [Orabug: 27501176]
- x86/spectre: Drop the warning about ibrs being obsolete (Konrad
Rzeszutek Wilk) [Orabug: 27518974]
- x86: Include linux/device.h in bugs_64.c (Boris Ostrovsky) [Orabug:
27519044]
- x86: fix mitigation details of UEK2 spectre v1 (Konrad Rzeszutek Wilk)
[Orabug: 27509909]
- x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2
microcodes (David Woodhouse) [Orabug: 27516441] {CVE-2017-5715}
- x86, intel: Output microcode revision in /proc/cpuinfo (Andi Kleen)
[Orabug: 27516441]
- x86: intel-family.h: Add GEMINI_LAKE SOC (Len Brown) [Orabug: 27516441]
- x86/cpu/intel: Introduce macros for Intel family numbers (Dave Hansen)
[Orabug: 27516441]
- x86/mitigation/spectre_v2: Add reporting of 'lfence' (Konrad Rzeszutek
Wilk) [Orabug: 27525958]
- x86/spec: Add 'lfence_enabled' in sysfs (Konrad Rzeszutek Wilk)
[Orabug: 27525954]
- x86/spec_ctrl: Add 'nolfence' knob to disable fallback for spectre_v2
mitigation (Konrad Rzeszutek Wilk) [Orabug: 27525923]
- x86/spec: Also print IBRS if IBPB is disabled (Konrad Rzeszutek Wilk)
[Orabug: 27519083]
- x86: Use Indirect Branch Prediction Barrier in context switch (Tim
Chen) [Orabug: 27516378]