ELSA-2018-4261

ELSA-2018-4261 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-10-24

Description


[4.1.12-124.20.7]
- Revert 'rds: RDS (tcp) hangs on sendto() to unresponding address' (Brian Maly) [Orabug: 28837953]

[4.1.12-124.20.6]
- x86/speculation: Retpoline should always be available on Skylake (Alexandre Chartre) [Orabug: 28801831]

[4.1.12-124.20.5]
- x86/speculation: Add sysfs entry to enable/disable retpoline (Alexandre Chartre) [Orabug: 28607548]
- x86/speculation: Switch to IBRS when loading a non-retpoline module (Alexandre Chartre) [Orabug: 28607548]
- x86/speculation: Remove unnecessary retpoline alternatives (Alexandre Chartre) [Orabug: 28607548]
- x86/speculation: Use static key to enable/disable retpoline (Alexandre Chartre) [Orabug: 28607548]
- locking/static_keys: Provide DECLARE and well as DEFINE macros (Tony Luck) [Orabug: 28607548]
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (Jason Baron) [Orabug: 28607548]
- locking/static_key: Fix concurrent static_key_slow_inc() (Paolo Bonzini) [Orabug: 28607548]
- jump_label: make static_key_enabled() work on static_key_true/false types too (Tejun Heo) [Orabug: 28607548]
- locking/static_keys: Fix up the static keys documentation (Jonathan Corbet) [Orabug: 28607548]
- locking/static_keys: Fix a silly typo (Jonathan Corbet) [Orabug: 28607548]
- jump label, locking/static_keys: Update docs (Jason Baron) [Orabug: 28607548]
- x86/asm: Add asm macros for static keys/jump labels (Andy Lutomirski) [Orabug: 28607548]
- x86/asm: Error out if asm/jump_label.h is included inappropriately (Andy Lutomirski) [Orabug: 28607548]
- jump_label/x86: Work around asm build bug on older/backported GCCs (Peter Zijlstra) [Orabug: 28607548]
- locking/static_keys: Add a new static_key interface (Peter Zijlstra) [Orabug: 28607548]
- locking/static_keys: Rework update logic (Peter Zijlstra) [Orabug: 28607548]
- jump_label: Add jump_entry_key() helper (Peter Zijlstra) [Orabug: 28607548]
- jump_label, locking/static_keys: Rename JUMP_LABEL_TYPE_* and related helpers to the static_key* pattern (Peter Zijlstra) [Orabug: 28607548]
- jump_label: Rename JUMP_LABEL_{EN,DIS}ABLE to JUMP_LABEL_{JMP,NOP} (Peter Zijlstra) [Orabug: 28607548]
- module, jump_label: Fix module locking (Peter Zijlstra) [Orabug: 28607548]
- x86/speculation: Protect against userspace-userspace spectreRSB (Jiri Kosina) [Orabug: 28631590] {CVE-2018-15572}
- x86/spectre_v2: Remove remaining references to lfence mitigation (Alejandro Jimenez) [Orabug: 28631590] {CVE-2018-15572}
- Revert 'md: allow a partially recovered device to be hot-added to an array.' (NeilBrown) [Orabug: 28702623]
- x86/bugs: ssbd_ibrs_selected called prematurely (Daniel Jordan) [Orabug: 28788839]
- net/mlx4_core: print firmware version during driver loading (Qing Huang) [Orabug: 28809377]
- mm: numa: Do not trap faults on shared data section pages. (Henry Willard) [Orabug: 28814880]
- hugetlbfs: dirty pages as they are added to pagecache (Mike Kravetz) [Orabug: 28813968]

[4.1.12-124.20.4]
- rds: RDS (tcp) hangs on sendto() to unresponding address (Ka-Cheong Poon) [Orabug: 28762608]
- nfs: fix a deadlock in nfs client initialization (Scott Mayhew) [Orabug: 28486463]
- infiniband: fix a possible use-after-free bug (Cong Wang) [Orabug: 28774517] {CVE-2018-14734}


Related CVEs


CVE-2018-14734
CVE-2018-15572

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.20.7.el6uek.src.rpm0c26e1eea8d159a8a4329546165152d7fce5a5b6b389dd1f1e63bc9bf998a278ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.20.7.el6uek.x86_64.rpm2e4979e0f5d81ab7cb1b2da7f17935eb6916890d15b5d1e063a0b7ff919e0755ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.20.7.el6uek.x86_64.rpmff7520813c81690f31265b40290fbf83f71559ea71e8c3f8af7fd5c02db09d01ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.20.7.el6uek.x86_64.rpm5b6d94338e2652727694d6f933d4c3e58ccde1c8e3f5a1e170047bfb3ad32c84ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.20.7.el6uek.x86_64.rpm270b33b5542929c6f25771ee8ecfa3993f14f5af280735c73b78dea3ad8b6d51ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.20.7.el6uek.noarch.rpm15879ae65c57d58b26cd5fa7a0db88ae310926c16c9739a358e13bb51720575cELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.20.7.el6uek.noarch.rpm025f1284670255fe8da5b95b51b5ab92fea5e89a228b622ff978b9b025713224ELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.20.7.el7uek.src.rpm9201f0548869a2715c4147d365243ef95f95b029d5085da3c684a11ac7f6ade5ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.20.7.el7uek.x86_64.rpm8ff44d899601e6c9a160360f14ecb04130f9931b519693a9947491235868de5bELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.20.7.el7uek.x86_64.rpm727bfd5bad74fa2d9384b6b6ba58a856240c8a89e3474ba33c2dc3bac1f55b62ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.20.7.el7uek.x86_64.rpm59d2bde390081d946fb802068e384a2a82d5975c3031e6a5396c149d78212ac2ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.20.7.el7uek.x86_64.rpm595148384b552f88252b309af5785c72dc98e71e8310e480a42891c10f76160dELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.20.7.el7uek.noarch.rpm87024e56d1d93c20b4012f6b59331018570e080e35646b9aa70dd7a6ce8a49f1ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.20.7.el7uek.noarch.rpm8a2440e438bf764606bd76723ed890c36610aad004f126261e304c1a8616f718ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete