ELSA-2019-0512

ELSA-2019-0512 - kernel security, bug fix, and enhancement update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-03-13

Description


[3.10.0-957.10.1.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [bug 24817676]

[3.10.0-957.10.1]
- [fs] revert '[fs] nfs: Don't write back further requests if there is a pending write error' (Benjamin Coddington) [1672510 1656674]
- [fs] cifs: connect to servername instead of IP for IPC$ share (Leif Sahlberg) [1672448 1647844]
- [acpi] nfit: Fix command-supported detection (Charles Rose) [1671743 1665811]
- [acpi] nfit: Block function zero DSMs (Charles Rose) [1671743 1665811]
- [x86] efi-bgrt: Replace early_memremap() with memremap() (Lenny Szubowicz) [1671745 1481667]
- [x86] efi-bgrt: Replace ioremap() with early_memremap() (Lenny Szubowicz) [1671745 1481667]
- [scsi] libiscsi: Allow sd_shutdown on bad transport (Chris Leech) [1670680 1630979]
- [block] blk-mq: punt failed direct issue to dispatch list (Ming Lei) [1670511 1656654]
- [block] blk-mq: fix corruption with direct issue (Ming Lei) [1670511 1656654]
- [powerpc] rtas: Fix a potential race between CPU-Offline & Migration (Steve Best) [1669044 1650249]
- [powerpc] pseries: Disable CPU hotplug across migrations (Steve Best) [1669044 1650249]
- [md] Add split counter for raid1 write request in the right place (Xiao Ni) [1668208 1659951]
- [lib] string_helpers.c: fix infinite loop in string_get_size() (Ewan Milne) [1667989 1660565]
- [kernel] stop_machine: Atomically queue and wake stopper threads (Phil Auld) [1667328 1557061]
- [kernel] stop_machine: Disable preemption after queueing stopper threads (Phil Auld) [1667328 1557061]
- [kernel] stop_machine: Disable preemption when waking two stopper threads (Phil Auld) [1667328 1557061]
- [kernel] stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (Phil Auld) [1667328 1557061]
- [kernel] stop_machine: Make cpu_stop_queue_work() and stop_one_cpu_nowait() return bool (Phil Auld) [1667328 1557061]
- [fs] proc: restrict kernel stack dumps to root (Joe Lawrence) [1642401 1638194] {CVE-2018-17972}
- [fs] proc: use 'unsigned int' for /proc/*/stack (Joe Lawrence) [1642401 1638194] {CVE-2018-17972}
- [fs] libceph: fall back to sendmsg for slab pages (Ilya Dryomov) [1665814 1647460]
- [scsi] csiostor: remove flush_scheduled_work() (Arjun Vynipadath) [1665370 1660882]
- [pci] shpchp: Separate existence of SHPC and permission to use it (Myron Stowe) [1663241 1633873]
- [pci] shpchp: Manage SHPC unconditionally on non-ACPI systems (Myron Stowe) [1663241 1633873]
- [pci] shpchp: Fix AMD POGO identification (Myron Stowe) [1663241 1633873]
- [mm] memcontrol: factor out reclaim iterator loading and updating (Aristeu Rozanski) [1663114 1595932]
- [net] xfrm: policy: init locks early (Herbert Xu) [1660887 1641866]
- [kernel] mm: clear __GFP_FS when PF_MEMALLOC_NOIO is set (Rafael Aquini) [1660392 1657714]
- [nvme] flush namespace scanning work just before removing namespaces (Ewan Milne) [1659937 1622487]
- [fs] fuse: don't need GETATTR after every READ (Miklos Szeredi) [1657921 1648781]
- [fs] fuse: don't invalidate attrs when not using atime (Miklos Szeredi) [1657921 1648781]
- [net] Set sk_prot_creator when cloning sockets to the right proto (Andrea Claudi) [1657351 1657352] {CVE-2018-9568}
- [kernel] bpf: 32-bit RSH verification must truncate input before the ALU op (Jiri Olsa) [1641387 1641388] {CVE-2018-18445}

[3.10.0-957.9.1]
- [input] psmouse: fix button reporting for basic protocols (Benjamin Tissoires) [1662848 1658669]
- [input] psmouse: add support for 2nd wheel on A4Tech Dual-Scroll wheel mice (Benjamin Tissoires) [1662848 1658669]

[3.10.0-957.8.1]
- [tty] add rwsem to close race between copy_from_read_buf calls and reset_buffer_flags (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Fix stall at n_tty_receive_char_special() (Christoph von Recklinghausen) [1660815 1649343]
- [tty] audit: Fix audit source (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Fix auditing support for cannonical mode (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Fix 4096-byte canonical reads (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Remove read_cnt (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Don't wrap input buffer indices at buffer size (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Get read_cnt through accessor (Christoph von Recklinghausen) [1660815 1649343]
- [tty] Deprecate ldisc .chars_in_buffer() method (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Split n_tty_chars_in_buffer() for reader-only interface (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Line copy to user buffer in canonical mode (Christoph von Recklinghausen) [1660815 1649343]
- [tty] n_tty: Factor canonical mode copy from n_tty_read() (Christoph von Recklinghausen) [1660815 1649343]
- [tty] Make ldisc input flow control concurrency-friendly (Christoph von Recklinghausen) [1660815 1649343]
- [tty] Simplify tty buffer/ldisc interface with helper function (Christoph von Recklinghausen) [1660815 1649343]

[3.10.0-957.7.1]
- [scsi] lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (Ewan Milne) [1664067 1657981]
- [scsi] qla2xxx: Delete session for nport id change (Himanshu Madhani) [1663508 1628301]

[3.10.0-957.6.1]
- [nvme] nvme-pci: move nvme_kill_queues to nvme_remove_dead_ctrl (David Milburn) [1661947 1632440]


Related CVEs


CVE-2018-18445
CVE-2018-17972
CVE-2018-9568

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-3.10.0-957.10.1.el7.src.rpm04b4a359a4b00caba2ae8eb3d184be97cf27cd5de33dcada6cf511e4a95b8ec6ELSA-2025-1281ol7_x86_64_latest
kernel-3.10.0-957.10.1.el7.src.rpm04b4a359a4b00caba2ae8eb3d184be97cf27cd5de33dcada6cf511e4a95b8ec6ELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-957.10.1.el7.src.rpm04b4a359a4b00caba2ae8eb3d184be97cf27cd5de33dcada6cf511e4a95b8ec6ELSA-2025-1281ol7_x86_64_optional_archive
kernel-3.10.0-957.10.1.el7.src.rpm04b4a359a4b00caba2ae8eb3d184be97cf27cd5de33dcada6cf511e4a95b8ec6ELSA-2025-1281ol7_x86_64_optional_latest
kernel-3.10.0-957.10.1.el7.src.rpm04b4a359a4b00caba2ae8eb3d184be97cf27cd5de33dcada6cf511e4a95b8ec6ELSA-2025-1281ol7_x86_64_u6_patch
bpftool-3.10.0-957.10.1.el7.x86_64.rpme704f911ee6b4818e8a391985aeab0e9f204c589e1c0ac63d34ab77f450b1851ELSA-2025-1281ol7_x86_64_latest
bpftool-3.10.0-957.10.1.el7.x86_64.rpme704f911ee6b4818e8a391985aeab0e9f204c589e1c0ac63d34ab77f450b1851ELSA-2025-1281ol7_x86_64_latest_archive
bpftool-3.10.0-957.10.1.el7.x86_64.rpme704f911ee6b4818e8a391985aeab0e9f204c589e1c0ac63d34ab77f450b1851ELSA-2025-1281ol7_x86_64_u6_patch
kernel-3.10.0-957.10.1.el7.x86_64.rpm65d563c4fbc2002eca1d77d80d6b7aac0a1141ce50427f2a95271866732286c6ELSA-2025-1281ol7_x86_64_latest
kernel-3.10.0-957.10.1.el7.x86_64.rpm65d563c4fbc2002eca1d77d80d6b7aac0a1141ce50427f2a95271866732286c6ELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-957.10.1.el7.x86_64.rpm65d563c4fbc2002eca1d77d80d6b7aac0a1141ce50427f2a95271866732286c6ELSA-2025-1281ol7_x86_64_u6_patch
kernel-abi-whitelists-3.10.0-957.10.1.el7.noarch.rpm77b11fc0d60ad2d8e776aa18b06fd8c9ad44674fee5c3871bbe359b9eec1d59bELSA-2025-1281ol7_x86_64_latest
kernel-abi-whitelists-3.10.0-957.10.1.el7.noarch.rpm77b11fc0d60ad2d8e776aa18b06fd8c9ad44674fee5c3871bbe359b9eec1d59bELSA-2025-1281ol7_x86_64_latest_archive
kernel-abi-whitelists-3.10.0-957.10.1.el7.noarch.rpm77b11fc0d60ad2d8e776aa18b06fd8c9ad44674fee5c3871bbe359b9eec1d59bELSA-2025-1281ol7_x86_64_u6_patch
kernel-debug-3.10.0-957.10.1.el7.x86_64.rpm456cb052b475210874d8b8d9e922d171e43640796e632d53b637f16df64fd6e4ELSA-2025-1281ol7_x86_64_latest
kernel-debug-3.10.0-957.10.1.el7.x86_64.rpm456cb052b475210874d8b8d9e922d171e43640796e632d53b637f16df64fd6e4ELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-3.10.0-957.10.1.el7.x86_64.rpm456cb052b475210874d8b8d9e922d171e43640796e632d53b637f16df64fd6e4ELSA-2025-1281ol7_x86_64_u6_patch
kernel-debug-devel-3.10.0-957.10.1.el7.x86_64.rpme59fcb5e3e1a0d8ba0eff31cddd8105ac4a525ae24ac192078872c498dd75db5ELSA-2025-1281ol7_x86_64_latest
kernel-debug-devel-3.10.0-957.10.1.el7.x86_64.rpme59fcb5e3e1a0d8ba0eff31cddd8105ac4a525ae24ac192078872c498dd75db5ELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-devel-3.10.0-957.10.1.el7.x86_64.rpme59fcb5e3e1a0d8ba0eff31cddd8105ac4a525ae24ac192078872c498dd75db5ELSA-2025-1281ol7_x86_64_u6_patch
kernel-devel-3.10.0-957.10.1.el7.x86_64.rpmd6e42dd7b8a27d25dcafbb3a66ecd6dabe54d7bd3dd4a8803b07587dfb066531ELSA-2025-1281ol7_x86_64_latest
kernel-devel-3.10.0-957.10.1.el7.x86_64.rpmd6e42dd7b8a27d25dcafbb3a66ecd6dabe54d7bd3dd4a8803b07587dfb066531ELSA-2025-1281ol7_x86_64_latest_archive
kernel-devel-3.10.0-957.10.1.el7.x86_64.rpmd6e42dd7b8a27d25dcafbb3a66ecd6dabe54d7bd3dd4a8803b07587dfb066531ELSA-2025-1281ol7_x86_64_u6_patch
kernel-doc-3.10.0-957.10.1.el7.noarch.rpmce7589a14e325b75ccc48b55037899795135c1d399647ebae00ccb286f6ece31ELSA-2025-1281ol7_x86_64_latest
kernel-doc-3.10.0-957.10.1.el7.noarch.rpmce7589a14e325b75ccc48b55037899795135c1d399647ebae00ccb286f6ece31ELSA-2025-1281ol7_x86_64_latest_archive
kernel-doc-3.10.0-957.10.1.el7.noarch.rpmce7589a14e325b75ccc48b55037899795135c1d399647ebae00ccb286f6ece31ELSA-2025-1281ol7_x86_64_u6_patch
kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm55524f350dda857da2bb6c7be7596b0b4154070fab3c27d76b6d41ab295526baELSA-2025-1281exadata_dbserver_19.2.1.0.0_x86_64_base
kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm55524f350dda857da2bb6c7be7596b0b4154070fab3c27d76b6d41ab295526baELSA-2025-1281exadata_dbserver_19.2.2.0.0_x86_64_base
kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm55524f350dda857da2bb6c7be7596b0b4154070fab3c27d76b6d41ab295526baELSA-2025-1281ol7_x86_64_latest
kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm55524f350dda857da2bb6c7be7596b0b4154070fab3c27d76b6d41ab295526baELSA-2025-1281ol7_x86_64_latest_archive
kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm55524f350dda857da2bb6c7be7596b0b4154070fab3c27d76b6d41ab295526baELSA-2025-1281ol7_x86_64_u6_patch
kernel-tools-3.10.0-957.10.1.el7.x86_64.rpm479847127010e426ae38344739f28820a99f093f002faa8ff6d530f0fc22e303ELSA-2025-1281ol7_x86_64_latest
kernel-tools-3.10.0-957.10.1.el7.x86_64.rpm479847127010e426ae38344739f28820a99f093f002faa8ff6d530f0fc22e303ELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-3.10.0-957.10.1.el7.x86_64.rpm479847127010e426ae38344739f28820a99f093f002faa8ff6d530f0fc22e303ELSA-2025-1281ol7_x86_64_u6_patch
kernel-tools-libs-3.10.0-957.10.1.el7.x86_64.rpmc6075e57870237b5688c516cdc264d5088c5824bdd7b70951af2da5fe3501193ELSA-2025-1281ol7_x86_64_latest
kernel-tools-libs-3.10.0-957.10.1.el7.x86_64.rpmc6075e57870237b5688c516cdc264d5088c5824bdd7b70951af2da5fe3501193ELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-libs-3.10.0-957.10.1.el7.x86_64.rpmc6075e57870237b5688c516cdc264d5088c5824bdd7b70951af2da5fe3501193ELSA-2025-1281ol7_x86_64_u6_patch
kernel-tools-libs-devel-3.10.0-957.10.1.el7.x86_64.rpm1dd16b2057683a6e052b237640eaccd407f4c6f8ad417eb7223112ee4d818563ELSA-2025-1281ol7_x86_64_optional_archive
kernel-tools-libs-devel-3.10.0-957.10.1.el7.x86_64.rpm1dd16b2057683a6e052b237640eaccd407f4c6f8ad417eb7223112ee4d818563ELSA-2025-1281ol7_x86_64_optional_latest
perf-3.10.0-957.10.1.el7.x86_64.rpm6f369e7f746c93059639f6eb76956ff5e1a0be03557d2b2528cd99809a527d0bELSA-2025-20019ol7_x86_64_latest
perf-3.10.0-957.10.1.el7.x86_64.rpm6f369e7f746c93059639f6eb76956ff5e1a0be03557d2b2528cd99809a527d0bELSA-2025-20019ol7_x86_64_latest_archive
perf-3.10.0-957.10.1.el7.x86_64.rpm6f369e7f746c93059639f6eb76956ff5e1a0be03557d2b2528cd99809a527d0bELSA-2025-20019ol7_x86_64_u6_patch
python-perf-3.10.0-957.10.1.el7.x86_64.rpm0599634f8790389a798d87b0ead9538a782ed7f459a4f0afe4c704bd2ac94dcaELSA-2025-20019ol7_x86_64_latest
python-perf-3.10.0-957.10.1.el7.x86_64.rpm0599634f8790389a798d87b0ead9538a782ed7f459a4f0afe4c704bd2ac94dcaELSA-2025-20019ol7_x86_64_latest_archive
python-perf-3.10.0-957.10.1.el7.x86_64.rpm0599634f8790389a798d87b0ead9538a782ed7f459a4f0afe4c704bd2ac94dcaELSA-2025-20019ol7_x86_64_u6_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete