The following two updates are available for Oracle Linux:
ELEA-2019-0042 Oracle Linux 7 kmod-redhat-ena
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2019-4317)
ELEA-2019-0042 Oracle Linux 7 kmod-redhat-ena
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2019-4317)
ELEA-2019-0042 Oracle Linux 7 kmod-redhat-ena
Oracle Linux Enhancement Advisory ELEA-2019-0042
http://linux.oracle.com/errata/ELEA-2019-0042.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kmod-redhat-ena-2.0.2K_dup7.6-2.0.1.el7_6.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kmod-redhat-ena-2.0.2K_dup7.6-2.0.1.el7_6.src.rpm
Description of changes:
[2.0.2K_dup7.6-2.0.1]
- add RHCK signature
[2.0.2K_dup7.6-2]
- baf6ab56eb2d596f7d4c6c1e1ccd8a73db6e1c94
- Resolves: #bz1659505
- ena module for Driver Update Program
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2019-4317)
Synopsis: ELSA-2019-4317 can now be patched using Ksplice
CVEs: CVE-2016-3841 CVE-2017-14051 CVE-2017-17450 CVE-2018-1000004 CVE-2018-1092
CVE-2018-9516
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2019-4317.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR2 2.6.39 on
OL5 and OL6 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2018-9516: Denial-of-service in Bluetooth HIDP debug events.
Missing bounds checks in the Bluetooth HIDP debugfs functions could
result in an out of bounds access and kernel crash, triggerable by a
privileged user.
Orabug: 29128174
* CVE-2017-17450: Unprivileged access to netlink namespaces.
A missing permission check in the netfilter xt_osf code allows an
unprivileged user to create user and net namespaces without the proper
permissions.
Orabug: 29037833
* Improved fix for CVE-2018-1000004: Denial-of-service in ALSA sequencer.
A race condition in the ALSA sequencer subsystem leads to use-after-free
and subsequent memory corruption. This could allow an attacker to cause
a denial-of-service and possibly escalate privilege.
Orabug: 29005191
* CVE-2018-1092: NULL pointer dereference when using unallocated root directory
on ext4 filesystem.
A missing check when using unallocated root directory on ext4 filesystem
could lead to a NULL pointer dereference. A local attacker could mount a
crafted ext4 filesystem and cause a denial-of-service.
* CVE-2017-14051: Denial-of-service in qla2xxx sysfs handler.
A failure to validate information from userspace can result in an
unbounded kernel memory allocation. A local user could use this flaw to
cause memory exhaustion or a kernel crash, resulting in a
denial-of-service.
Orabug: 28220492
* CVE-2016-3841: Use-after-free accessing the IPv6 transmit options.
Incorrect locking when accessing the IPv6 options in various places in the
network stack could lead to a user-after-free on concurrent destruction. A
local user could use this flaw to cause a denial-of-service or potentially
escalate privileges.
Orabug: 25059185
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.