ELSA-2018-4270

ELSA-2018-4270 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-11-08

Description


[4.14.35-1818.4.5]
- x86/intel/spectre_v2: Remove unnecessary retp_compiler() test (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Deprecate spec_store_bypass_disable=userspace (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: x86_spec_ctrl_set needs to be called unconditionally (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: Drop unused DISABLE_IBRS_CLOBBER macro (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Keep SPEC_CTRL_SSBD when IBRS is in use (Boris Ostrovsky) [Orabug: 28814574]

[4.14.35-1818.4.4]
- ocfs2: fix ocfs2 read block panic (Junxiao Bi) [Orabug: 28821391]
- scsi: sg: mitigate read/write abuse (Jann Horn) [Orabug: 28824731] {CVE-2017-13168}
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike Kravetz) [Orabug: 28776542]
- rds: MPRDS messages delivered out of order (Ka-Cheong Poon) [Orabug: 28838051]
- x86/bugs: rework x86_spec_ctrl_set to make its changes explicit (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: rename ssbd_ibrs_selected to ssbd_userspace_selected (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: x86_spec_ctrl_set may not disable IBRS on kernel idle (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: always use x86_spec_ctrl_base or _priv when setting spec ctrl MSR (Daniel Jordan) [Orabug: 28270952]
- iommu: turn on iommu=pt by default (Tushar Dave) [Orabug: 28111039]
- vhost/scsi: Use common handling code in request queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Extract common handling code from control queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Respond to control queue operations (Bijan Mottahedeh) [Orabug: 28775556]

[4.14.35-1818.4.3]
- Fix error code in nfs_lookup_verify_inode() (Lance Shelton) [Orabug: 28807515]
- x86/speculation: Retpoline should always be available on Skylake (Alexandre Chartre) [Orabug: 28801830]
- x86/bugs: ssbd_ibrs_selected called prematurely (Daniel Jordan) [Orabug: 28802799]
- net/mlx4_core: print firmware version during driver loading (Qing Huang) [Orabug: 28809382]
- hugetlbfs: dirty pages as they are added to pagecache (Mike Kravetz) [Orabug: 28813999]

[4.14.35-1818.4.2]
- infiniband: fix a possible use-after-free bug (Cong Wang) [Orabug: 28774511] {CVE-2018-14734}
- nfs: fix a deadlock in nfs client initialization (Scott Mayhew) [Orabug: 28775910]
- x86/speculation: Unconditionally fill RSB on context switch (Alejandro Jimenez) [Orabug: 28631576] {CVE-2018-15572}
- bnxt_re: Implement the shutdown hook of the L2-RoCE driver interface (Somnath Kotur) [Orabug: 28539344]
- rds: RDS (tcp) hangs on sendto() to unresponding address (Ka-Cheong Poon) [Orabug: 28762597]
- uek-rpm: aarch64 some XGENE drivers must be be modules (Tom Saeger) [Orabug: 28769119]
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (Marc Zyngier) [Orabug: 28762424] {CVE-2018-18021}
- arm64: KVM: Tighten guest core register access from userspace (Dave Martin) [Orabug: 28762424] {CVE-2018-18021}
- iommu/amd: Clear memory encryption mask from physical address (Singh, Brijesh) [Orabug: 28770185]

[4.14.35-1818.4.1]
- mm: get rid of vmacache_flush_all() entirely (Linus Torvalds) [Orabug: 28700955] {CVE-2018-17182}
- Btrfs: fix log replay failure after unlink and link combination (Filipe Manana) [Orabug: 27941939]
- x86/speculation: Add sysfs entry to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Allow IBRS firmware to be enabled when IBRS is disabled (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Remove unnecessary retpoline alternatives (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Use static key to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- bnxt_en: Fix memory fault in bnxt_ethtool_init() (Vasundhara Volam) [Orabug: 28632641]
- IB/core: Initialize relaxed_pd properly (Yuval Shaia) [Orabug: 28197305]

[4.14.35-1818.4.0]
- e1000e: Fix link check race condition (Benjamin Poirier) [Orabug: 28489384]
- Revert 'e1000e: Separate signaling for link check/link up' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Avoid missed interrupts following ICR read (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Fix queue interrupt re-raising in Other interrupt (Benjamin Poirier) [Orabug: 28489384]
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Remove Other from EIAC (Benjamin Poirier) [Orabug: 28489384]
- btrfs: validate type when reading a chunk (Gu Jinxiang) [Orabug: 28700851] {CVE-2018-14611}
- btrfs: Check that each block group has corresponding chunk at mount time (Qu Wenruo) [Orabug: 28700872] {CVE-2018-14610}
- net: rds: Use address family to designate IPv4 or IPv6 addresses (Hakon Bugge) [Orabug: 28720069]
- net: rds: Fix blank at eol in af_rds.c (Hakon Bugge) [Orabug: 28720069]


Related CVEs


CVE-2017-13168
CVE-2018-17182
CVE-2018-14734
CVE-2018-14610
CVE-2018-18021
CVE-2018-15572
CVE-2018-14611

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-1818.4.5.el7uek.src.rpmfbd238f15f12f3276f23671c10d5466e8c948384a479c6a3670b57df1d8f69c3ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-1818.4.5.el7uek.aarch64.rpmc99ab82d0127dfda711468c85fd48e566ccf9d4307b78bab70df83ccafa805acELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-4.14.35-1818.4.5.el7uek.aarch64.rpm19e4687c1bf937f8d0ed0ba3d930c6ed6f8c4664483071f942afa0aaab84d0ffELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm12a45cb6619e9918f6fdd9770fc1428aedf658a06095ec7a5b31a3ecef6d3d86ELSA-2025-20190ol7_aarch64_latest
kernel-uek-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm13b00e5a8ff31bc0d7b838a3a078da63e399e2838d6ea2993a602805239bcdbdELSA-2025-20190ol7_aarch64_latest
kernel-uek-headers-4.14.35-1818.4.5.el7uek.aarch64.rpmf669c500869b6ab48b0e5643292f0d4536f51ce371eadc759fbccb04aac73a46ELBA-2025-20014ol7_aarch64_latest
kernel-uek-tools-4.14.35-1818.4.5.el7uek.aarch64.rpm415e38274a403f149c37904aad075f13fe7592077ebe867c9a77f7043d37a88cELSA-2025-20190ol7_aarch64_latest
kernel-uek-tools-libs-4.14.35-1818.4.5.el7uek.aarch64.rpm6123f1ffd289fcf17ea76fa8296dcb6d7273cc3a973d41cc4b4ca0fc788a234cELSA-2025-20019ol7_aarch64_latest
kernel-uek-tools-libs-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm54d04b913c20cd38ad214dc0d91394b929157603ad6ec9233f223f752c859b78ELBA-2025-20014ol7_aarch64_latest
perf-4.14.35-1818.4.5.el7uek.aarch64.rpm982390577eab741154ca5d32d7cc3ca5aa8cd5e3bb0b97e21caf7ac8cdaf07f9ELSA-2025-20019ol7_aarch64_latest
python-perf-4.14.35-1818.4.5.el7uek.aarch64.rpm4645c9a1870cb3b66c96781ebb37e923b27b2dc308e2197090798f01b4918cb6ELSA-2025-20019ol7_aarch64_latest
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-1818.4.5.el7uek.src.rpmfbd238f15f12f3276f23671c10d5466e8c948384a479c6a3670b57df1d8f69c3ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-4.14.35-1818.4.5.el7uek.x86_64.rpmb538c9acadd027283f2101e4d37727ab57270cf1f65c132fa0bbd6213e143b3fELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-4.14.35-1818.4.5.el7uek.x86_64.rpmb2f4edf401065b828d8f821e956d7e42c261d9903d7392abfad9add1b8e22fecELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-debug-devel-4.14.35-1818.4.5.el7uek.x86_64.rpmd2eaa43fbecf63be69056d2b97c8ead5321e661b530a1afb58d801107c398e3dELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-devel-4.14.35-1818.4.5.el7uek.x86_64.rpmd5b9972415ac5a7b9a6d6b320bc62287b9981e46979efaf3c2300b211c549b84ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-doc-4.14.35-1818.4.5.el7uek.noarch.rpm10d10eb44b92b593392f55f281be14aa0481de0fd967885faf634679e2659000ELSA-2025-20190ol7_x86_64_UEKR5_archive
kernel-uek-tools-4.14.35-1818.4.5.el7uek.x86_64.rpm1b827063dc6461b7fe9281bbab7a1b41e92f5cd97d7bd36b25c283b54c265955ELSA-2025-20190ol7_x86_64_UEKR5_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete