ELSA-2018-4270

ELSA-2018-4270 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2018-11-08

Description


[4.14.35-1818.4.5]
- x86/intel/spectre_v2: Remove unnecessary retp_compiler() test (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Deprecate spec_store_bypass_disable=userspace (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: x86_spec_ctrl_set needs to be called unconditionally (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: Drop unused DISABLE_IBRS_CLOBBER macro (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Keep SPEC_CTRL_SSBD when IBRS is in use (Boris Ostrovsky) [Orabug: 28814574]

[4.14.35-1818.4.4]
- ocfs2: fix ocfs2 read block panic (Junxiao Bi) [Orabug: 28821391]
- scsi: sg: mitigate read/write abuse (Jann Horn) [Orabug: 28824731] {CVE-2017-13168}
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike Kravetz) [Orabug: 28776542]
- rds: MPRDS messages delivered out of order (Ka-Cheong Poon) [Orabug: 28838051]
- x86/bugs: rework x86_spec_ctrl_set to make its changes explicit (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: rename ssbd_ibrs_selected to ssbd_userspace_selected (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: x86_spec_ctrl_set may not disable IBRS on kernel idle (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: always use x86_spec_ctrl_base or _priv when setting spec ctrl MSR (Daniel Jordan) [Orabug: 28270952]
- iommu: turn on iommu=pt by default (Tushar Dave) [Orabug: 28111039]
- vhost/scsi: Use common handling code in request queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Extract common handling code from control queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Respond to control queue operations (Bijan Mottahedeh) [Orabug: 28775556]

[4.14.35-1818.4.3]
- Fix error code in nfs_lookup_verify_inode() (Lance Shelton) [Orabug: 28807515]
- x86/speculation: Retpoline should always be available on Skylake (Alexandre Chartre) [Orabug: 28801830]
- x86/bugs: ssbd_ibrs_selected called prematurely (Daniel Jordan) [Orabug: 28802799]
- net/mlx4_core: print firmware version during driver loading (Qing Huang) [Orabug: 28809382]
- hugetlbfs: dirty pages as they are added to pagecache (Mike Kravetz) [Orabug: 28813999]

[4.14.35-1818.4.2]
- infiniband: fix a possible use-after-free bug (Cong Wang) [Orabug: 28774511] {CVE-2018-14734}
- nfs: fix a deadlock in nfs client initialization (Scott Mayhew) [Orabug: 28775910]
- x86/speculation: Unconditionally fill RSB on context switch (Alejandro Jimenez) [Orabug: 28631576] {CVE-2018-15572}
- bnxt_re: Implement the shutdown hook of the L2-RoCE driver interface (Somnath Kotur) [Orabug: 28539344]
- rds: RDS (tcp) hangs on sendto() to unresponding address (Ka-Cheong Poon) [Orabug: 28762597]
- uek-rpm: aarch64 some XGENE drivers must be be modules (Tom Saeger) [Orabug: 28769119]
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (Marc Zyngier) [Orabug: 28762424] {CVE-2018-18021}
- arm64: KVM: Tighten guest core register access from userspace (Dave Martin) [Orabug: 28762424] {CVE-2018-18021}
- iommu/amd: Clear memory encryption mask from physical address (Singh, Brijesh) [Orabug: 28770185]

[4.14.35-1818.4.1]
- mm: get rid of vmacache_flush_all() entirely (Linus Torvalds) [Orabug: 28700955] {CVE-2018-17182}
- Btrfs: fix log replay failure after unlink and link combination (Filipe Manana) [Orabug: 27941939]
- x86/speculation: Add sysfs entry to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Allow IBRS firmware to be enabled when IBRS is disabled (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Remove unnecessary retpoline alternatives (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Use static key to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- bnxt_en: Fix memory fault in bnxt_ethtool_init() (Vasundhara Volam) [Orabug: 28632641]
- IB/core: Initialize relaxed_pd properly (Yuval Shaia) [Orabug: 28197305]

[4.14.35-1818.4.0]
- e1000e: Fix link check race condition (Benjamin Poirier) [Orabug: 28489384]
- Revert 'e1000e: Separate signaling for link check/link up' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Avoid missed interrupts following ICR read (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Fix queue interrupt re-raising in Other interrupt (Benjamin Poirier) [Orabug: 28489384]
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Remove Other from EIAC (Benjamin Poirier) [Orabug: 28489384]
- btrfs: validate type when reading a chunk (Gu Jinxiang) [Orabug: 28700851] {CVE-2018-14611}
- btrfs: Check that each block group has corresponding chunk at mount time (Qu Wenruo) [Orabug: 28700872] {CVE-2018-14610}
- net: rds: Use address family to designate IPv4 or IPv6 addresses (Hakon Bugge) [Orabug: 28720069]
- net: rds: Fix blank at eol in af_rds.c (Hakon Bugge) [Orabug: 28720069]


Related CVEs


CVE-2018-17182
CVE-2018-14734
CVE-2018-15572
CVE-2017-13168
CVE-2018-14610
CVE-2018-14611
CVE-2018-18021

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1818.4.5.el7uek.src.rpm6dc2642af469d4fd8b0c1481b58b27d3ELSA-2021-9220
kernel-uek-4.14.35-1818.4.5.el7uek.aarch64.rpmdb6c89ad0bb4c24efdd83f1fe252b011ELSA-2021-9220
kernel-uek-debug-4.14.35-1818.4.5.el7uek.aarch64.rpma42fd3d2956e44001e76eda2d596e9f6ELSA-2021-9220
kernel-uek-debug-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm932102749413c6a0e4dd6d62dc2033cbELSA-2021-9220
kernel-uek-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm05dff1326a3fc0ae2897412a65e9ca6fELSA-2021-9220
kernel-uek-headers-4.14.35-1818.4.5.el7uek.aarch64.rpme7c0a90e7ce0aebcf45dc7ee120ce0d7ELSA-2021-9222
kernel-uek-tools-4.14.35-1818.4.5.el7uek.aarch64.rpm634a66a07991b921a0c7f88d802cc965ELSA-2021-9220
kernel-uek-tools-libs-4.14.35-1818.4.5.el7uek.aarch64.rpm8c28a41d4a666409e4a4eef8f088359dELSA-2021-9220
kernel-uek-tools-libs-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm6995ae06806d2f47e46a7ead0bcf5425ELSA-2021-9222
perf-4.14.35-1818.4.5.el7uek.aarch64.rpmebbcdd8aca64b9d4a11f5d706e79af33ELSA-2021-9220
python-perf-4.14.35-1818.4.5.el7uek.aarch64.rpm76c42ffb40fd6676287b4adef27273b9ELSA-2021-9220
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1818.4.5.el7uek.src.rpm6dc2642af469d4fd8b0c1481b58b27d3ELSA-2021-9220
kernel-uek-4.14.35-1818.4.5.el7uek.x86_64.rpm65e43ad23c2091470916744f0cb54222ELSA-2021-9220
kernel-uek-debug-4.14.35-1818.4.5.el7uek.x86_64.rpme64619e60e0ad6fd145f778054b31a45ELSA-2021-9220
kernel-uek-debug-devel-4.14.35-1818.4.5.el7uek.x86_64.rpm54d95da95700ea768f45217e1600b997ELSA-2021-9220
kernel-uek-devel-4.14.35-1818.4.5.el7uek.x86_64.rpme6bc461335855d89185852ea6dfb4c29ELSA-2021-9220
kernel-uek-doc-4.14.35-1818.4.5.el7uek.noarch.rpmddfab9ced68293e8e919b1bebd205cffELSA-2021-9220
kernel-uek-tools-4.14.35-1818.4.5.el7uek.x86_64.rpm5e29c41ab066c4a228e13fc3c125cbc2ELSA-2021-9220



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete