[El-errata] ELSA-2019-4628 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update (aarch64)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Tue May 14 19:20:00 PDT 2019


Oracle Linux Security Advisory ELSA-2019-4628

http://linux.oracle.com/errata/ELSA-2019-4628.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

aarch64:
kernel-uek-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
kernel-uek-debug-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
kernel-uek-debug-devel-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
kernel-uek-devel-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
kernel-uek-headers-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
kernel-uek-tools-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
kernel-uek-tools-libs-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
kernel-uek-tools-libs-devel-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
perf-4.14.35-1844.4.5.2.el7uek.aarch64.rpm
python-perf-4.14.35-1844.4.5.2.el7uek.aarch64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-4.14.35-1844.4.5.2.el7uek.src.rpm



Description of changes:

[4.14.35-1844.4.5.2.el7uek]
- x86/mds: Add empty commit for CVE-2019-11091 (Konrad Rzeszutek Wilk) 
[Orabug: 29721848] {CVE-2019-11091}
- x86/speculation/mds: Make mds_mitigation mutable after init (Konrad 
Rzeszutek Wilk) [Orabug: 29721835] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}

[4.14.35-1844.4.5.1.el7uek]
- x86/speculation: Support 'mitigations=' cmdline option (Josh 
Poimboeuf) [Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}
- cpu/speculation: Add 'mitigations=' cmdline option (Josh Poimboeuf) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations 
off (Konrad Rzeszutek Wilk) [Orabug: 29526899] {CVE-2018-12126} 
{CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Fix comment (Boris Ostrovsky) [Orabug: 29526899] 
{CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add debugfs for controlling MDS (Kanth Ghatraju) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add boot option to enable MDS protection only 
while in idle (Boris Ostrovsky) [Orabug: 29526899] {CVE-2018-12126} 
{CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add SMT warning message (Josh Poimboeuf) [Orabug: 
29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation: Move arch_smt_update() call to after mitigation 
decisions (Josh Poimboeuf) [Orabug: 29526899] {CVE-2018-12126} 
{CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mds=full,nosmt cmdline option (Josh 
Poimboeuf) [Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}
- Documentation: Add MDS vulnerability documentation (Thomas Gleixner) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- Documentation: Move L1TF to separate directory (Thomas Gleixner) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mitigation mode VMWERV (Thomas Gleixner) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add sysfs reporting for MDS (Thomas Gleixner) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mitigation control for MDS (Thomas Gleixner) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry 
(Thomas Gleixner) [Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Thomas 
Gleixner) [Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}
- x86/speculation/mds: Clear CPU buffers on exit to user (Thomas 
Gleixner) [Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}
- x86/speculation/mds: Add mds_clear_cpu_buffers() (Thomas Gleixner) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Andi Kleen) [Orabug: 
29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add BUG_MSBDS_ONLY (Thomas Gleixner) [Orabug: 
29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add basic bug infrastructure for MDS (Andi Kleen) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} 
{CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation: Consolidate CPU whitelists (Thomas Gleixner) [Orabug: 
29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/msr-index: Cleanup bit defines (Thomas Gleixner) [Orabug: 
29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
file (Will Deacon) [Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}
- x86/cpu: Sanitize FAM6_ATOM naming (Peter Zijlstra) [Orabug: 29526899] 
{CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- Documentation/l1tf: Fix small spelling typo (Salvatore Bonaccorso) 
[Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation: Simplify the CPU bug detection logic (Dominik 
Brodowski) [Orabug: 29526899] {CVE-2018-12126} {CVE-2018-12130} 
{CVE-2018-12127}
- tools include: Adopt linux/bits.h (Arnaldo Carvalho de Melo) [Orabug: 
29526899] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}





More information about the El-errata mailing list