[El-errata] ELSA-2018-0395 Important: Oracle Linux 7 kernel security and bug fix update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Mar 7 19:38:04 PST 2018


Oracle Linux Security Advisory ELSA-2018-0395

http://linux.oracle.com/errata/ELSA-2018-0395.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
kernel-3.10.0-693.21.1.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-693.21.1.el7.noarch.rpm
kernel-debug-3.10.0-693.21.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.21.1.el7.x86_64.rpm
kernel-devel-3.10.0-693.21.1.el7.x86_64.rpm
kernel-doc-3.10.0-693.21.1.el7.noarch.rpm
kernel-headers-3.10.0-693.21.1.el7.x86_64.rpm
kernel-tools-3.10.0-693.21.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.21.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-693.21.1.el7.x86_64.rpm
perf-3.10.0-693.21.1.el7.x86_64.rpm
python-perf-3.10.0-693.21.1.el7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-3.10.0-693.21.1.el7.src.rpm



Description of changes:

- [3.10.0-693.21.1.el7.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel 
(olkmod_signing_key.x509)(alexey.petrenko at oracle.com)
- Update x509.genkey [bug 24817676]

[3.10.0-693.21.1.el7]
- [x86] platform/uv: Mark tsc_check_sync as an init function (Frank 
Ramsay) [1547870 1526066]
- [x86] platform/uv: Add check of TSC state set by UV BIOS (Frank 
Ramsay) [1547870 1526066]
- [x86] tsc: Provide a means to disable TSC ART (Frank Ramsay) [1547870 
1526066]
- [x86] tsc: Drastically reduce the number of firmware bug warnings 
(Frank Ramsay) [1547870 1526066]
- [x86] tsc: Skip TSC test and error messages if already unstable (Frank 
Ramsay) [1547870 1526066]
- [x86] tsc: Add option that TSC on Socket 0 being non-zero is valid 
(Frank Ramsay) [1547870 1526066]
- [x86] tsc: Remove the TSC_ADJUST clamp (Frank Ramsay) [1547870 1526066]

[3.10.0-693.20.1.el7]
- [x86] locking/qspinlock: Fix kabi problem in a non-KVM/XEN VM (Waiman 
Long) [1539797 1533529]

[3.10.0-693.19.1.el7]
- [watchdog] hpwdt: remove indirect call in drivers/watchdog/hpwdt.c 
(Josh Poimboeuf) [1539649 1535644]
- [kernel] x86/spec_ctrl: cleanup __ptrace_may_access (Josh Poimboeuf) 
[1539649 1535644]
- [x86] bugs: Drop one "mitigation" from dmesg (Josh Poimboeuf) [1539649 
1535644]
- [x86] kvm: vmx: Make indirect call speculation safe (Josh Poimboeuf) 
[1539649 1535644]
- [x86] kvm: x86: Make indirect calls in emulator speculation safe (Josh 
Poimboeuf) [1539649 1535644]
- [x86] retpoline: Optimize inline assembler for vmexit_fill_RSB (Josh 
Poimboeuf) [1539649 1535644]
- [x86] mce: Make machine check speculation protected (Josh Poimboeuf) 
[1539649 1535644]
- [x86] spec_ctrl: fix ptrace IBPB optimization (Josh Poimboeuf) 
[1539649 1535644]
- [x86] spec_ctrl: Avoid returns in IBRS-disabled regions (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spectre/meltdown: avoid the vulnerability directory to weaken 
kernel security (Josh Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: Document retpolines and ibrs_enabled=3 (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: upgrade GCC retpoline warning to an error (Josh 
Poimboeuf) [1539649 1535644]
- [x86] Use IBRS for firmware update path (Josh Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: stuff RSB on context switch with SMEP enabled (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: enforce sane combinations of IBRS and retpoline (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: use upstream RSB stuffing function (Josh Poimboeuf) 
[1539649 1535644]
- [x86] spec_ctrl: add ibrs_enabled=3 (ibrs_user) (Josh Poimboeuf) 
[1539649 1535644]
- [kernel] x86/jump_label: warn on failed jump label patch (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: detect unretpolined modules (Josh Poimboeuf) [1539649 
1535644]
- [x86] retpoline: Add LFENCE to the retpoline/RSB filling RSB macros 
(Josh Poimboeuf) [1539649 1535644]
- [x86] retpoline: Fill return stack buffer on vmexit (Josh Poimboeuf) 
[1539649 1535644]
- [x86] retpoline/xen: Convert Xen hypercall indirect jumps (Josh 
Poimboeuf) [1539649 1535644]
- [x86] retpoline/hyperv: Convert assembler indirect jumps (Josh 
Poimboeuf) [1539649 1535644]
- [x86] retpoline/ftrace: Convert ftrace assembler indirect jumps (Josh 
Poimboeuf) [1539649 1535644]
- [x86] retpoline/entry: Convert entry assembler indirect jumps (Josh 
Poimboeuf) [1539649 1535644]
- [x86] retpoline/crypto: Convert crypto assembler indirect jumps (Josh 
Poimboeuf) [1539649 1535644]
- [x86] retpoline: Add initial retpoline support (Josh Poimboeuf) 
[1539649 1535644]
- [x86] jump_label: add asm support for static keys (Josh Poimboeuf) 
[1539649 1535644]
- [x86] asm: Make asm/alternative.h safe from assembly (Josh Poimboeuf) 
[1539649 1535644]
- [tools] objtool: Support new GCC 6 switch jump table pattern (Josh 
Poimboeuf) [1539649 1535644]
- [tools] objtool: Detect jumps to retpoline thunks (Josh Poimboeuf) 
[1539649 1535644]
- [x86] spectre: Add boot time option to select Spectre v2 mitigation 
(Josh Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: print features changed by microcode loading (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: refactor the init and microcode loading paths (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: move initialization of X86_FEATURE_IBPB_SUPPORT (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: remove SPEC_CTRL_PCP_IBPB bit (Josh Poimboeuf) 
[1539649 1535644]
- [x86] spec_ctrl: remove ibrs_enabled variable (Josh Poimboeuf) 
[1539649 1535644]
- [x86] spec_ctrl: add ibp_disabled variable (Josh Poimboeuf) [1539649 
1535644]
- [x86] spec_ctrl: add X86_FEATURE_IBP_DISABLE (Josh Poimboeuf) [1539649 
1535644]
- [x86] spec_ctrl: remove IBP disable for AMD model 0x16 (Josh 
Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: remove performance measurements from documentation 
(Josh Poimboeuf) [1539649 1535644]
- [x86] spec_ctrl: make ipbp_enabled read-only (Josh Poimboeuf) [1539649 
1535644]
- [x86] spec_ctrl: remove ibpb_enabled=2 mode (Josh Poimboeuf) [1539649 
1535644]
- [x86] cpu: Implement CPU vulnerabilites sysfs functions (Josh 
Poimboeuf) [1539649 1535644]
- [base] sysfs/cpu: Add vulnerability folder (Josh Poimboeuf) [1539649 
1535644]
- [x86] cpu: Merge bugs.c and bugs_64.c (Josh Poimboeuf) [1539649 1535644]
- [x86] syscall: int80 must not clobber r12-15 (Josh Poimboeuf) [1539649 
1535644]
- [x86] syscall: change ia32_syscall() to create the full register frame 
in ia32_do_call() (Josh Poimboeuf) [1539649 1535644]
- [x86] boot: Add early cmdline parsing for options with arguments (Josh 
Poimboeuf) [1539649 1535644]
- [x86] boot: Pass in size to early cmdline parsing (Josh Poimboeuf) 
[1539649 1535644]
- [x86] boot: Simplify early command line parsing (Josh Poimboeuf) 
[1539649 1535644]
- [x86] boot: Fix early command-line parsing when partial word matches 
(Josh Poimboeuf) [1539649 1535644]
- [x86] boot: Fix early command-line parsing when matching at end (Josh 
Poimboeuf) [1539649 1535644]
- [scsi] storvsc: Fix scsi_cmd error assignments in storvsc_handle_error 
(Cathy Avery) [1536978 1502601]
- [fs] nfs: RPC_MAX_AUTH_SIZE is in bytes ("J. Bruce Fields") [1533378 
1495321]
- [fs] nfsd: give out fewer session slots as limit approaches (Dave 
Wysochanski) [1533377 1492234]
- [fs] nfsd: increase DRC cache limit (Dave Wysochanski) [1533377 1492234]
- [x86] kvm: x86: fix RSM when PCID is non-zero (Paolo Bonzini) [1531662 
1530711]
- [x86] iommu/amd: Reduce delay waiting for command buffer space 
(Suravee Suthikulpanit) [1531456 1508644]
- [x86] iommu/amd: Reduce amount of MMIO when submitting commands 
(Suravee Suthikulpanit) [1531456 1508644]
- [x86] amd: Remove cmd_buf_size and evt_buf_size from struct amd_iommu 
(Suravee Suthikulpanit) [1531456 1508644]
- [x86] amd: Fix the left value check of cmd buffer (Suravee 
Suthikulpanit) [1531456 1508644]
- [x86] amd: Don't put completion-wait semaphore on stack (Suravee 
Suthikulpanit) [1531456 1508644]
- [x86] kvm: svm: obey guest PAT (Suravee Suthikulpanit) [1530976 1478185]
- [tty] serial: 8250_pci: Add Amazon PCI serial device ID (Vitaly 
Kuznetsov) [1530137 1527545]
- [ata] libata: sata_down_spd_limit should return if driver has not 
recorded sstatus speed (David Milburn) [1530136 1457140]
- [fs] nfs: fix a deadlock in nfs client initialization (Scott Mayhew) 
[1530135 1506382]
- [fs] nfsv4.0: Fix a lock leak in nfs40_walk_client_list (Scott Mayhew) 
[1530135 1506382]
- [fs] nfs: Create a common nfs4_match_client() function (Scott Mayhew) 
[1530135 1506382]
- [fs] autofs - revert: take more care to not update last_used on path 
walk (Ian Kent) [1525994 1489542]
- [vhost] vhost_net: correctly check tx avail during rx busy polling 
(Jason Wang) [1523784 1487551]
- [crypto] shash - Fix has_key setting (Herbert Xu) [1522932 1505817]
- [block] Fix a race between blk_cleanup_queue() and timeout handling 
(Ming Lei) [1522698 1513725]
- [x86] tsc: Force TSC_ADJUST register to value >= zero (Prarit 
Bhargava) [1519850 1497055]
- [x86] tsc: Validate cpumask pointer before accessing it (Prarit 
Bhargava) [1519850 1497055]
- [x86] tsc: Try to adjust TSC if sync test fails (Prarit Bhargava) 
[1519850 1497055]
- [x86] tsc: Prepare warp test for TSC adjustment (Prarit Bhargava) 
[1519850 1497055]
- [x86] tsc: Move sync cleanup to a safe place (Prarit Bhargava) 
[1519850 1497055]
- [x86] tsc: Sync test only for the first cpu in a package (Prarit 
Bhargava) [1519850 1497055]
- [x86] tsc: Verify TSC_ADJUST from idle (Prarit Bhargava) [1519850 1497055]
- [x86] tsc: Store and check TSC ADJUST MSR (Prarit Bhargava) [1519850 
1497055]
- [x86] tsc: Detect random warps (Prarit Bhargava) [1519850 1497055]
- [x86] kvm: mmu: always terminate page walks at level 1 (Paolo Bonzini) 
[1500382 1500381] {CVE-2017-12188}
- [x86] kvm: nVMX: update last_nonleaf_level when initializing nested 
EPT (Denys Vlasenko) [1500382 1500381] {CVE-2017-12188}
- [x86] kvm: fix singlestepping over syscall (Paolo Bonzini) [1464480 
1464481] {CVE-2017-7518}

[3.10.0-693.18.1.el7]
- [md] raid5: fix a race condition in stripe batch (Nigel Croxon) 
[1535883 1496836]
- [security] selinux: fix double free in selinux_parse_opts_str() (Paul 
Moore) [1532288 1456843]
- [fs] nfs: revert "nfs: Move the flock open mode check into 
nfs_flock()" (Benjamin Coddington) [1531095 1497225]





More information about the El-errata mailing list