ELSA-2018-1629

ELSA-2018-1629 - kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2018-05-22

Description


[3.10.0-862.3.2.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [bug 24817676]

[3.10.0-862.3.2]
- [x86] spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] entry: Add missing '$' in IBRS macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Use CamelCase for SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Rename _RDS to _SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [kernel] seccomp: Enable speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Provide details on speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] nospec: Allow getting/setting on non-current task (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [uapi] prctl: Add speculation control prctls (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] kvm/vmx: Expose SPEC_CTRL Bit(2) to the guest (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs/amd: Add support to disable RDS on Fam[15, 16, 17]h if requested (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Expose /sys/../spec_store_bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Read SPEC_CTRL MSR during boot and re-use (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] cpufeatures: Make CPU bugs sticky (Waiman Long) [1566904 1566905] {CVE-2018-3639}

[3.10.0-862.3.1]
- [x86] kpti/kexec: fix wrong page address in clear_page (Dave Young) [1573173 1571162]
- [x86] kvm: fix icebp instruction handling (Paolo Bonzini) [1566849 1566845] {CVE-2018-1087}
- [x86] entry/64: Don't use IST entry for #BP stack (Paolo Bonzini) [1567084 1567083] {CVE-2018-8897}
- [kernel] perf/hwbp: Simplify the perf-hwbp code, fix documentation (Eugene Syromiatnikov) [1569878 1569874] {CVE-2018-1000199}


Related CVEs


CVE-2018-3639

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (x86_64) kernel-3.10.0-862.3.2.el7.src.rpm08b790fdc4cb02bbd6472c2ff46ab8f4ELBA-2021-1397-1
kernel-3.10.0-862.3.2.el7.x86_64.rpmf460384ee96a1b17a09ef86a34d4abbeELBA-2021-1397-1
kernel-abi-whitelists-3.10.0-862.3.2.el7.noarch.rpma0e8003b92cd68cd9951c3dba8bb6142ELBA-2021-1397-1
kernel-debug-3.10.0-862.3.2.el7.x86_64.rpmb4f06fda3aedb422ae6252c584d33fd6ELBA-2021-1397-1
kernel-debug-devel-3.10.0-862.3.2.el7.x86_64.rpm84cb280fdd4ac8401e3c30202cf67ecaELBA-2021-1397-1
kernel-devel-3.10.0-862.3.2.el7.x86_64.rpm155322dbdc65c8d7f12fc61b4b7b7b09ELBA-2021-1397-1
kernel-doc-3.10.0-862.3.2.el7.noarch.rpm175b3d87c193b1be4e53a6e6c48008a1ELBA-2021-1397-1
kernel-headers-3.10.0-862.3.2.el7.x86_64.rpm12c6139ee44002a18079a358e8e3d283ELBA-2021-1397-1
kernel-tools-3.10.0-862.3.2.el7.x86_64.rpmf44d730a93775f3d92da101fc14a5b8eELBA-2021-1397-1
kernel-tools-libs-3.10.0-862.3.2.el7.x86_64.rpm2e9573c0059d5c35adb3bf89f0161fb5ELBA-2021-1397-1
kernel-tools-libs-devel-3.10.0-862.3.2.el7.x86_64.rpmdb4b5047c12fdabf941c88cddd4e0523ELBA-2021-1397-1
perf-3.10.0-862.3.2.el7.x86_64.rpma0ff3d638ffb8b2e0d7d4a054018bbffELSA-2021-9220
python-perf-3.10.0-862.3.2.el7.x86_64.rpm306828c26b50df65ec860c058aa7b826ELSA-2021-9220



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete