ELSA-2019-2473

ELSA-2019-2473 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2019-08-14

Description


[2.6.32-754.18.2.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.18.2]
- [x86] x86/speculation: Enable Spectre v1 swapgs mitigations (Waiman Long) [1724512] {CVE-2019-1125}
- [x86] x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations (Waiman Long) [1724512] {CVE-2019-1125}

[2.6.32-754.18.1]
- [virt] xenbus: don't look up transaction IDs for ordinary writes (Vitaly Kuznetsov) [1663262]
- [virt] xenbus: don't BUG() on user mode induced condition (Vitaly Kuznetsov) [1663262]
- [virt] xenbus: Add proper handling of XS_ERROR from Xenbus for transactions (Vitaly Kuznetsov) [1663262]
- [fs] proc: restrict kernel stack dumps to root (Denys Vlasenko) [1638193] {CVE-2018-17972}
- [crypto] salsa20 - fix blkcipher_walk API usage (Bruno Eduardo de Oliveira Meneguele) [1543984]
- [mm] vmscan: do not loop on too_many_isolated for ever (Rafael Aquini) [1658254]
- [x86] spec_ctrl: Don't report the use of retpoline on Skylake as vulnerable (Waiman Long) [1666102]
- [mm] try harder to allocate vmemmap blocks (Rafael Aquini) [1591394]
- [v4l] dvb: revert spectre v1 mitigation (Josh Poimboeuf) [1647975]
- [fs] binfmt_misc.c: do not allow offset overflow (Bill O'Donnell) [1710149]
- [x86] pti: Don't use PCID and INVPCID in x86-32 (Waiman Long) [1702782]
- [mm] mincore.c: make mincore() more conservative (Rafael Aquini) [1664197] {CVE-2019-5489}
- [x86] spec: Move retp_compiler() inline function to bugs.c (Waiman Long) [1722185]


Related CVEs


CVE-2017-17805
CVE-2019-5489
CVE-2018-17972
CVE-2019-1125

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-754.18.2.el6.src.rpm7192ac94b23e65a34f05b1b4ba352da5ELSA-2021-9212
kernel-2.6.32-754.18.2.el6.i686.rpmf60772f62e792239b3ac959badbde9dcELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpmec8cefdf5705fc73e950f75a93de2a54ELSA-2021-9212
kernel-debug-2.6.32-754.18.2.el6.i686.rpm66e9190c349ddbcb26b88ff388582e0dELSA-2021-9212
kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm1825c698417577eba73c9cee6a41b479ELSA-2021-9212
kernel-devel-2.6.32-754.18.2.el6.i686.rpmd2e84b051d36964026ac2a20e3823656ELSA-2021-9212
kernel-doc-2.6.32-754.18.2.el6.noarch.rpmd851f597abe0ea12ed8df6ac8139f670ELSA-2021-9212
kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm60f15b52ad0d2b79f202738896cf7036ELSA-2021-9212
kernel-headers-2.6.32-754.18.2.el6.i686.rpm5b3f60c80054390f977dd5434ab161b4ELSA-2021-9212
perf-2.6.32-754.18.2.el6.i686.rpm227c390a5a0767f00b69b29608370a1bELSA-2021-9212
python-perf-2.6.32-754.18.2.el6.i686.rpm8ffeb9b1538f40cecf0ebd4bf7da7cb9ELSA-2021-9212
Oracle Linux 6 (x86_64) kernel-2.6.32-754.18.2.el6.src.rpm7192ac94b23e65a34f05b1b4ba352da5ELSA-2021-9212
kernel-2.6.32-754.18.2.el6.x86_64.rpme7b2a979a84678e1039502715a6ea444ELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpmec8cefdf5705fc73e950f75a93de2a54ELSA-2021-9212
kernel-debug-2.6.32-754.18.2.el6.x86_64.rpm44850608aed6c8db9d9009e843b350efELSA-2021-9212
kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm1825c698417577eba73c9cee6a41b479ELSA-2021-9212
kernel-debug-devel-2.6.32-754.18.2.el6.x86_64.rpm46def17a74ac15899141a9dbdc2c1cc8ELSA-2021-9212
kernel-devel-2.6.32-754.18.2.el6.x86_64.rpm40b10fdf0129377e5dd1f457149d97c0ELSA-2021-9212
kernel-doc-2.6.32-754.18.2.el6.noarch.rpmd851f597abe0ea12ed8df6ac8139f670ELSA-2021-9212
kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm60f15b52ad0d2b79f202738896cf7036ELSA-2021-9212
kernel-headers-2.6.32-754.18.2.el6.x86_64.rpm3ccda1fe72172122d94be8c5ea3a9846ELSA-2021-9212
perf-2.6.32-754.18.2.el6.x86_64.rpmf8cc77f0d1f7ff9b815e2bb37c6e50b1ELSA-2021-9212
python-perf-2.6.32-754.18.2.el6.x86_64.rpm28c8cb43a1652b6e829bcbc969328d73ELSA-2021-9212



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete