ELSA-2019-0717

ELSA-2019-0717 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2019-04-11

Description


[2.6.32-754.12.1.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.12.1]
- [x86] vDSO: Don't generate retpoline for indirect call (Waiman Long) [1638552]
- [fs] cifs: fix reparse point/symlink breakage (Leif Sahlberg) [1636484]
- [scsi] qla2xxx: Mask off Scope bits in retry delay (Himanshu Madhani) [1588133]
- [net] tcp: make tcp_retransmit_timer a no-op on empty write queue (Paolo Abeni) [1585892]
- [kernel] sched/sysctl: Check user input value of sysctl_sched_time_avg (Lauro Ramos Venancio) [1579128]
- [fs] Fix up non-directory creation in SGID directories (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] hugetlbfs: switch to inode_init_owner() (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] udf: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] ubifs: replace inode uid, gid, mode initialization with helper function (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] ramfs: replace inode uid, gid, mode initialization with helper function (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] ext4: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] ext3: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] ext2: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] btrfs: replace inode uid, gid, mode initialization with helper function (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [fs] vfs: Add inode uid,gid,mode init helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
- [s390] kernel: adapt to changed CPU vulnerabilities function prototypes (Hendrik Brueckner) [1625381]
- [s390] detect etoken facility (Hendrik Brueckner) [1625381]
- [s390] Correct register corruption in critical section cleanup (Hendrik Brueckner) [1625381]
- [s390] remove indirect branch from do_softirq_own_stack (Hendrik Brueckner) [1625381]
- [s390] move spectre sysfs attribute code (Hendrik Brueckner) [1625381]
- [s390] kernel: use expoline for indirect branches (Hendrik Brueckner) [1625381]
- [s390] ftrace: use expoline for indirect branches (Hendrik Brueckner) [1625381]
- [s390] move expoline assembler macros to a header (Hendrik Brueckner) [1625381]
- [s390] correct module section names for expoline code revert (Hendrik Brueckner) [1625381]
- [x86] speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (Oleksandr Natalenko) [1670328]
- [perf] Fix a race between ring_buffer_detach() and ring_buffer_attach() (Jiri Olsa) [1589340]
- [perf] Fix mmap() accounting hole (Jiri Olsa) [1627672]
- [perf] Fix perf mmap bugs (Jiri Olsa) [1627672]


Related CVEs


CVE-2018-13405

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-754.12.1.el6.src.rpm266970e8204b89f23115aeafe1fab6c0ELSA-2021-9212
kernel-2.6.32-754.12.1.el6.i686.rpm734cce96e0c545db1c2221ff85c5ff4bELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.12.1.el6.noarch.rpm9510b0d927bcf78400a0b13e152bb38bELSA-2021-9212
kernel-debug-2.6.32-754.12.1.el6.i686.rpmf52809e6d8fa9007b0977e03fefc43feELSA-2021-9212
kernel-debug-devel-2.6.32-754.12.1.el6.i686.rpmd3044c88a07a2fff5685a0342c855194ELSA-2021-9212
kernel-devel-2.6.32-754.12.1.el6.i686.rpm2b6cccd2105932001a7c9cb92150f923ELSA-2021-9212
kernel-doc-2.6.32-754.12.1.el6.noarch.rpm35a63a95eb9b45beea4f92705a23902eELSA-2021-9212
kernel-firmware-2.6.32-754.12.1.el6.noarch.rpme3d70db45a1a197efc5d3caad7da968fELSA-2021-9212
kernel-headers-2.6.32-754.12.1.el6.i686.rpm2de60835142eb9460de6b83c869e6ea8ELSA-2021-9212
perf-2.6.32-754.12.1.el6.i686.rpm029abe3f090bdd7fbd626017204cea72ELSA-2021-9212
python-perf-2.6.32-754.12.1.el6.i686.rpm9383d73b068002fa5c273cc280442703ELSA-2021-9212
Oracle Linux 6 (x86_64) kernel-2.6.32-754.12.1.el6.src.rpm266970e8204b89f23115aeafe1fab6c0ELSA-2021-9212
kernel-2.6.32-754.12.1.el6.x86_64.rpmb7b375cc6c656510f12e556f8659cb07ELSA-2021-9212
kernel-abi-whitelists-2.6.32-754.12.1.el6.noarch.rpm9510b0d927bcf78400a0b13e152bb38bELSA-2021-9212
kernel-debug-2.6.32-754.12.1.el6.x86_64.rpmbcfe63c909305c918234bfd2818601adELSA-2021-9212
kernel-debug-devel-2.6.32-754.12.1.el6.i686.rpmd3044c88a07a2fff5685a0342c855194ELSA-2021-9212
kernel-debug-devel-2.6.32-754.12.1.el6.x86_64.rpm6c8416cef93b4996740133461618ffa8ELSA-2021-9212
kernel-devel-2.6.32-754.12.1.el6.x86_64.rpm664045dd1dc269e9128b583326bc3dfbELSA-2021-9212
kernel-doc-2.6.32-754.12.1.el6.noarch.rpm35a63a95eb9b45beea4f92705a23902eELSA-2021-9212
kernel-firmware-2.6.32-754.12.1.el6.noarch.rpme3d70db45a1a197efc5d3caad7da968fELSA-2021-9212
kernel-headers-2.6.32-754.12.1.el6.x86_64.rpm066958d6873317ab9ec061c03efc4058ELSA-2021-9212
perf-2.6.32-754.12.1.el6.x86_64.rpm8357782c86b1685a5a08dfe0a3d4c58cELSA-2021-9212
python-perf-2.6.32-754.12.1.el6.x86_64.rpmfd9ad62d52ea8f204c8acc5a4952def7ELSA-2021-9212



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete