[El-errata] ELSA-2018-4089 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed May 2 06:52:35 PDT 2018


Oracle Linux Security Advisory ELSA-2018-4089

http://linux.oracle.com/errata/ELSA-2018-4089.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
kernel-uek-firmware-3.8.13-118.20.6.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-118.20.6.el7uek.noarch.rpm
kernel-uek-3.8.13-118.20.6.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.20.6.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.20.6.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.20.6.el7uek.x86_64.rpm
dtrace-modules-3.8.13-118.20.6.el7uek-0.4.5-3.el7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-118.20.6.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-118.20.6.el7uek-0.4.5-3.el7.src.rpm



Description of changes:

kernel-uek
[3.8.13-118.20.6.el7uek]
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (Linus 
Torvalds)  [Orabug: 27947608]  {CVE-2018-100199}

[3.8.13-118.20.5.el7uek]
- x86/microcode: probe CPU features on microcode update (Ankur Arora) 
[Orabug: 27806667]
- x86/microcode: microcode_write() should not reference boot_cpu_data 
(Ankur Arora)  [Orabug: 27806667]
- x86/cpufeatures: use cpu_data in init_scattered_cpuid_flags() (Ankur 
Arora)  [Orabug: 27806667]

[3.8.13-118.20.4.el7uek]
- Drivers: hv: fcopy: set .owner reference for file operations (Joe Jin) 
  [Orabug: 21191022]
- ALSA: usb-audio: Kill stray URB at exiting (Takashi Iwai)  [Orabug: 
27148281]  {CVE-2017-16527}
- HID: usbhid: fix out-of-bounds bug (Jaejoong Kim)  [Orabug: 27207929] 
{CVE-2017-16533}
- [media] cx231xx-cards: fix NULL-deref on missing association 
descriptor (Johan Hovold)  [Orabug: 27208072]  {CVE-2017-16536}
- net: cdc_ether: fix divide by 0 on bad descriptors (Bjørn Mork) 
[Orabug: 27215201]  {CVE-2017-16649}
- x86/microcode/intel: Extend BDW late-loading with a revision check 
(Jia Zhang)  [Orabug: 27343577]
- x86/microcode/intel: Disable late loading on model 79 (Borislav 
Petkov)  [Orabug: 27343577]
- Bluetooth: bnep: bnep_add_connection() should verify that it's dealing 
with l2cap socket (Al Viro)  [Orabug: 27344793]  {CVE-2017-15868}
- Bluetooth: hidp: verify l2cap sockets (David Herrmann)  [Orabug: 
27344793]  {CVE-2017-15868}
- ALSA: pcm: prevent UAF in snd_pcm_info (Robb Glasser)  [Orabug: 
27344843]  {CVE-2017-0861} {CVE-2017-0861}
- ptrace: use fsuid, fsgid, effective creds for fs access checks (Jann 
Horn)  [Orabug: 27364691]  {CVE-2017-14140}
- sctp: do not peel off an assoc from one netns to another one (Xin 
Long)  [Orabug: 27387001]  {CVE-2017-15115}
- Revert "x86/spec_ctrl: Add 'nolfence' knob to disable fallback for 
spectre_v2 mitigation" (Ankur Arora)  [Orabug: 27601787]  {CVE-2017-5715}
- Revert "x86/spec: Add 'lfence_enabled' in sysfs" (Ankur Arora) 
[Orabug: 27601787]  {CVE-2017-5715}
- Revert "x86/mitigation/spectre_v2: Add reporting of 'lfence'" (Ankur 
Arora)  [Orabug: 27601787]  {CVE-2017-5715}
- x86/mitigation/spectre_v2: Add reporting of 'lfence' (Konrad Rzeszutek 
Wilk)   {CVE-2017-5715}
- x86/spec: Add 'lfence_enabled' in sysfs (Konrad Rzeszutek Wilk) 
{CVE-2017-5715}
- x86/spec_ctrl: Add 'nolfence' knob to disable fallback for spectre_v2 
mitigation (Konrad Rzeszutek Wilk)   {CVE-2017-5715}
- x86/spectre: bring spec_ctrl management logic closer to UEK4 (Ankur 
Arora)  [Orabug: 27516512]  {CVE-2017-5715}
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (David 
Woodhouse)  [Orabug: 27516357]  {CVE-2017-5715}
- x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes (Darren Kenny) 
  [Orabug: 27516419]  {CVE-2017-5715}
- x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 
microcodes (David Woodhouse)  [Orabug: 27516419]  {CVE-2017-5715}
- x86: intel-family.h: Add GEMINI_LAKE SOC (Len Brown)  [Orabug: 27516419]
- x86/cpu/intel: Introduce macros for Intel family numbers (Dave Hansen) 
  [Orabug: 27516419]
- x86/spectre: expose 'stibp' (Konrad Rzeszutek Wilk)  [Orabug: 
27516419]  {CVE-2017-5715}
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) 
support (David Woodhouse)  [Orabug: 27516379]  {CVE-2017-5715}
- x86/speculation: Use Indirect Branch Prediction Barrier in context 
switch (Tim Chen)  [Orabug: 27516379]  {CVE-2017-5715}
- x86/spectre: fix spectre_v1 mitigation indicators (Ankur Arora) 
[Orabug: 27509932]  {CVE-2017-5715}
- x86/ia32/syscall: Clear extended registers %r8-%r15 (Ankur Arora) 
[Orabug: 27452028]  {CVE-2017-5715}
- x86/ia32/syscall: Save full stack frame throughout the entry code 
(Ankur Arora)  [Orabug: 27452028]  {CVE-2017-5715}
- x86/ia32/syscall: cleanup trailing whitespace (Ankur Arora)  [Orabug: 
27452028]  {CVE-2017-5715}
- x86/syscall: Clear callee saved registers (%r12-%r15, %rbp, %rbx) 
(Ankur Arora)  [Orabug: 27452028]  {CVE-2017-5715}
- x86/syscall: Save callee saved registers on syscall entrance (Ankur 
Arora)  [Orabug: 27452028]  {CVE-2017-5715}




More information about the El-errata mailing list