ELSA-2019-1488

ELSA-2019-1488 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-06-18

Description


[2.6.32-754.15.3.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.15.3]
- [net] tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (Florian Westphal) [1719614] {CVE-2019-11479}
- [net] tcp: add tcp_min_snd_mss sysctl (Florian Westphal) [1719614] {CVE-2019-11479}
- [net] tcp: tcp_fragment() should apply sane memory limits (Florian Westphal) [1719840] {CVE-2019-11478}
- [net] tcp: limit payload size of sacked skbs (Florian Westphal) [1719585] {CVE-2019-11477}
- [net] tcp: pass previous skb to tcp_shifted_skb() (Florian Westphal) [1719585] {CVE-2019-11477}

[2.6.32-754.15.2]
- [lib] idr: free the top layer if idr tree has the maximum height (Denys Vlasenko) [1698139] {CVE-2019-3896}
- [lib] idr: fix top layer handling (Denys Vlasenko) [1698139] {CVE-2019-3896}
- [lib] idr: fix backtrack logic in idr_remove_all (Denys Vlasenko) [1698139] {CVE-2019-3896}

[2.6.32-754.15.1]
- [x86] x86/speculation: Don't print MDS_MSG_SMT message if mds_nosmt specified (Waiman Long) [1710081 1710517]
- [x86] x86/spec_ctrl: Fix incorrect MDS handling in late microcode loading (Waiman Long) [1710081 1710517]
- [x86] x86/speculation: Fix misuse of boot_cpu_has() with bug bits (Waiman Long) [1710121]
- [x86] x86/speculation/mds: Fix documentation typo (Waiman Long) [1710517]
- [documentation] Documentation: Correct the possible MDS sysfs values (Waiman Long) [1710517]
- [x86] x86/mds: Add MDSUM variant to the MDS documentation (Waiman Long) [1710517]
- [x86] x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (Waiman Long) [1710517]
- [x86] x86/speculation/mds: Fix comment (Waiman Long) [1710517]
- [x86] x86/speculation/mds: Add SMT warning message (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mds=full, nosmt cmdline option (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Remove redundant arch_smt_update() invocation (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add debugfs x86/smt_present file (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Update MDS mitigation status after late microcode load (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Add MDS vulnerability documentation (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Move L1TF to separate directory (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation mode VMWERV (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add sysfs reporting for MDS (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation control for MDS (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kvm] x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Clear CPU buffers on exit to user (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mds_clear_cpu_buffers() (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kvm] x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add BUG_MSBDS_ONLY (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add basic bug infrastructure for MDS (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Consolidate CPU whitelists (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/l1tf: Show actual SMT state (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Simplify sysfs report of VMX L1TF vulnerability (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/cpu: Sanitize FAM6_ATOM naming (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kernel] sched/smt: Provide sched_smt_active() (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Provide arch_smt_update() (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/mm: Fix compilation warning in pgtable_types.h (Waiman Long) [1692386 1692387 1692388] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}


Related CVEs


CVE-2019-11477
CVE-2019-3896
CVE-2019-11478
CVE-2019-11479

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-754.15.3.el6.src.rpmd8548967ee50016ed9cae4be5bd03402afa85290762242c84f007329684eaba7ELSA-2024-1831ol6_i386_latest
kernel-2.6.32-754.15.3.el6.src.rpmd8548967ee50016ed9cae4be5bd03402afa85290762242c84f007329684eaba7ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-754.15.3.el6.src.rpmd8548967ee50016ed9cae4be5bd03402afa85290762242c84f007329684eaba7ELSA-2024-1831ol6_u10_i386_patch
kernel-2.6.32-754.15.3.el6.i686.rpmb13f901d9bb0c18d903a91272b5d6ab6fad538d838595f075df7c1accc055da7ELSA-2024-1831ol6_i386_latest
kernel-2.6.32-754.15.3.el6.i686.rpmb13f901d9bb0c18d903a91272b5d6ab6fad538d838595f075df7c1accc055da7ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-754.15.3.el6.i686.rpmb13f901d9bb0c18d903a91272b5d6ab6fad538d838595f075df7c1accc055da7ELSA-2024-1831ol6_u10_i386_patch
kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm2ddec5d4079b553a3cd834717a2b22a6c5feb89c63cfd36c57dfedf547f28af3ELSA-2024-1831ol6_i386_latest
kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm2ddec5d4079b553a3cd834717a2b22a6c5feb89c63cfd36c57dfedf547f28af3ELSA-2024-1831ol6_i386_latest_archive
kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm2ddec5d4079b553a3cd834717a2b22a6c5feb89c63cfd36c57dfedf547f28af3ELSA-2024-1831ol6_u10_i386_patch
kernel-debug-2.6.32-754.15.3.el6.i686.rpm16ad6272ce4bfd83dbb25faa4f45b60d5415668acaa9a4b62953aef4e0afde82ELSA-2024-1831ol6_i386_latest
kernel-debug-2.6.32-754.15.3.el6.i686.rpm16ad6272ce4bfd83dbb25faa4f45b60d5415668acaa9a4b62953aef4e0afde82ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-754.15.3.el6.i686.rpm16ad6272ce4bfd83dbb25faa4f45b60d5415668acaa9a4b62953aef4e0afde82ELSA-2024-1831ol6_u10_i386_patch
kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpmdc0c0986f1b963a02fb66818af0a52d9a22f731cd5dd378082bee807fc947203ELSA-2024-1831ol6_i386_latest
kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpmdc0c0986f1b963a02fb66818af0a52d9a22f731cd5dd378082bee807fc947203ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpmdc0c0986f1b963a02fb66818af0a52d9a22f731cd5dd378082bee807fc947203ELSA-2024-1831ol6_u10_i386_patch
kernel-devel-2.6.32-754.15.3.el6.i686.rpme8dc7f486e39009d394b4482a86928b3a7bf4b603c6c740208b1f01c969995b2ELSA-2024-1831ol6_i386_latest
kernel-devel-2.6.32-754.15.3.el6.i686.rpme8dc7f486e39009d394b4482a86928b3a7bf4b603c6c740208b1f01c969995b2ELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-754.15.3.el6.i686.rpme8dc7f486e39009d394b4482a86928b3a7bf4b603c6c740208b1f01c969995b2ELSA-2024-1831ol6_u10_i386_patch
kernel-doc-2.6.32-754.15.3.el6.noarch.rpm5502e3468680e59ced220c36f9e6a817c7278bbb13489c26de9c4721d97b2e7bELSA-2024-1831ol6_i386_latest
kernel-doc-2.6.32-754.15.3.el6.noarch.rpm5502e3468680e59ced220c36f9e6a817c7278bbb13489c26de9c4721d97b2e7bELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-754.15.3.el6.noarch.rpm5502e3468680e59ced220c36f9e6a817c7278bbb13489c26de9c4721d97b2e7bELSA-2024-1831ol6_u10_i386_patch
kernel-firmware-2.6.32-754.15.3.el6.noarch.rpmac137124f2c53d87e5c5720527bc7ba8924ff40543a74dfe9753501962d4c87dELSA-2024-1831ol6_i386_latest
kernel-firmware-2.6.32-754.15.3.el6.noarch.rpmac137124f2c53d87e5c5720527bc7ba8924ff40543a74dfe9753501962d4c87dELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-754.15.3.el6.noarch.rpmac137124f2c53d87e5c5720527bc7ba8924ff40543a74dfe9753501962d4c87dELSA-2024-1831ol6_u10_i386_patch
kernel-headers-2.6.32-754.15.3.el6.i686.rpmd70900bf1bbe0322abe7ae8bbe3df922ae10a441db954b781b273baf9522b62dELSA-2024-1831ol6_i386_latest
kernel-headers-2.6.32-754.15.3.el6.i686.rpmd70900bf1bbe0322abe7ae8bbe3df922ae10a441db954b781b273baf9522b62dELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-754.15.3.el6.i686.rpmd70900bf1bbe0322abe7ae8bbe3df922ae10a441db954b781b273baf9522b62dELSA-2024-1831ol6_u10_i386_patch
perf-2.6.32-754.15.3.el6.i686.rpm5d5efcc932b2c09b34df9bbdbbbbcd3b57e504dd18ab5a66d85bd291276b06f7ELSA-2024-1831ol6_i386_latest
perf-2.6.32-754.15.3.el6.i686.rpm5d5efcc932b2c09b34df9bbdbbbbcd3b57e504dd18ab5a66d85bd291276b06f7ELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-754.15.3.el6.i686.rpm5d5efcc932b2c09b34df9bbdbbbbcd3b57e504dd18ab5a66d85bd291276b06f7ELSA-2024-1831ol6_u10_i386_patch
python-perf-2.6.32-754.15.3.el6.i686.rpm13d0419d4c2c0e94961b457bac98ee9e8052a1711907c15a57d255a74686d478ELSA-2024-1831ol6_i386_latest
python-perf-2.6.32-754.15.3.el6.i686.rpm13d0419d4c2c0e94961b457bac98ee9e8052a1711907c15a57d255a74686d478ELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-754.15.3.el6.i686.rpm13d0419d4c2c0e94961b457bac98ee9e8052a1711907c15a57d255a74686d478ELSA-2024-1831ol6_u10_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-754.15.3.el6.src.rpmd8548967ee50016ed9cae4be5bd03402afa85290762242c84f007329684eaba7ELSA-2024-1831ol6_u10_x86_64_patch
kernel-2.6.32-754.15.3.el6.src.rpmd8548967ee50016ed9cae4be5bd03402afa85290762242c84f007329684eaba7ELSA-2024-1831ol6_x86_64_latest
kernel-2.6.32-754.15.3.el6.src.rpmd8548967ee50016ed9cae4be5bd03402afa85290762242c84f007329684eaba7ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-754.15.3.el6.x86_64.rpm5dfcdc2e3f9f84ff8e4e4f4755bb97afe65e682dfa7dea87ceccb5ca3e5100ffELSA-2024-1831ol6_u10_x86_64_patch
kernel-2.6.32-754.15.3.el6.x86_64.rpm5dfcdc2e3f9f84ff8e4e4f4755bb97afe65e682dfa7dea87ceccb5ca3e5100ffELSA-2024-1831ol6_x86_64_latest
kernel-2.6.32-754.15.3.el6.x86_64.rpm5dfcdc2e3f9f84ff8e4e4f4755bb97afe65e682dfa7dea87ceccb5ca3e5100ffELSA-2024-1831ol6_x86_64_latest_archive
kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm2ddec5d4079b553a3cd834717a2b22a6c5feb89c63cfd36c57dfedf547f28af3ELSA-2024-1831ol6_u10_x86_64_patch
kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm2ddec5d4079b553a3cd834717a2b22a6c5feb89c63cfd36c57dfedf547f28af3ELSA-2024-1831ol6_x86_64_latest
kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm2ddec5d4079b553a3cd834717a2b22a6c5feb89c63cfd36c57dfedf547f28af3ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-754.15.3.el6.x86_64.rpmf5c435f611161f343322e2be7b66aba129a362a7be97a2f02fa59bab72976b2aELSA-2024-1831ol6_u10_x86_64_patch
kernel-debug-2.6.32-754.15.3.el6.x86_64.rpmf5c435f611161f343322e2be7b66aba129a362a7be97a2f02fa59bab72976b2aELSA-2024-1831ol6_x86_64_latest
kernel-debug-2.6.32-754.15.3.el6.x86_64.rpmf5c435f611161f343322e2be7b66aba129a362a7be97a2f02fa59bab72976b2aELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpmdc0c0986f1b963a02fb66818af0a52d9a22f731cd5dd378082bee807fc947203ELSA-2024-1831ol6_u10_x86_64_patch
kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpmdc0c0986f1b963a02fb66818af0a52d9a22f731cd5dd378082bee807fc947203ELSA-2024-1831ol6_x86_64_latest
kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpmdc0c0986f1b963a02fb66818af0a52d9a22f731cd5dd378082bee807fc947203ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpmf12b17771c62b23b54f544c83c2e6d383e2b0bf3dd237b1dac09382d9b9ca61bELSA-2024-1831ol6_u10_x86_64_patch
kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpmf12b17771c62b23b54f544c83c2e6d383e2b0bf3dd237b1dac09382d9b9ca61bELSA-2024-1831ol6_x86_64_latest
kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpmf12b17771c62b23b54f544c83c2e6d383e2b0bf3dd237b1dac09382d9b9ca61bELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm114fcb6fbaa020098726d3519a43936ae16bac9d06f91a179c906fc191972d73ELSA-2024-1831ol6_u10_x86_64_patch
kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm114fcb6fbaa020098726d3519a43936ae16bac9d06f91a179c906fc191972d73ELSA-2024-1831ol6_x86_64_latest
kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm114fcb6fbaa020098726d3519a43936ae16bac9d06f91a179c906fc191972d73ELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-754.15.3.el6.noarch.rpm5502e3468680e59ced220c36f9e6a817c7278bbb13489c26de9c4721d97b2e7bELSA-2024-1831ol6_u10_x86_64_patch
kernel-doc-2.6.32-754.15.3.el6.noarch.rpm5502e3468680e59ced220c36f9e6a817c7278bbb13489c26de9c4721d97b2e7bELSA-2024-1831ol6_x86_64_latest
kernel-doc-2.6.32-754.15.3.el6.noarch.rpm5502e3468680e59ced220c36f9e6a817c7278bbb13489c26de9c4721d97b2e7bELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-754.15.3.el6.noarch.rpmac137124f2c53d87e5c5720527bc7ba8924ff40543a74dfe9753501962d4c87dELSA-2024-1831ol6_u10_x86_64_patch
kernel-firmware-2.6.32-754.15.3.el6.noarch.rpmac137124f2c53d87e5c5720527bc7ba8924ff40543a74dfe9753501962d4c87dELSA-2024-1831ol6_x86_64_latest
kernel-firmware-2.6.32-754.15.3.el6.noarch.rpmac137124f2c53d87e5c5720527bc7ba8924ff40543a74dfe9753501962d4c87dELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-754.15.3.el6.x86_64.rpma3f86b27bc0ed0a385364d707c0afc61e56f7eb0517121c713b0ddf0543e650dELSA-2024-1831ol6_u10_x86_64_patch
kernel-headers-2.6.32-754.15.3.el6.x86_64.rpma3f86b27bc0ed0a385364d707c0afc61e56f7eb0517121c713b0ddf0543e650dELSA-2024-1831ol6_x86_64_latest
kernel-headers-2.6.32-754.15.3.el6.x86_64.rpma3f86b27bc0ed0a385364d707c0afc61e56f7eb0517121c713b0ddf0543e650dELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-754.15.3.el6.x86_64.rpmc015d406ca9313daf74ab76592c6391fb49068251e8597b332f09ec5d2d12079ELSA-2024-1831ol6_u10_x86_64_patch
perf-2.6.32-754.15.3.el6.x86_64.rpmc015d406ca9313daf74ab76592c6391fb49068251e8597b332f09ec5d2d12079ELSA-2024-1831ol6_x86_64_latest
perf-2.6.32-754.15.3.el6.x86_64.rpmc015d406ca9313daf74ab76592c6391fb49068251e8597b332f09ec5d2d12079ELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-754.15.3.el6.x86_64.rpmecf85a00ff62740320126fa082d48e283c090852366444dcca26be1a8704949aELSA-2024-1831ol6_u10_x86_64_patch
python-perf-2.6.32-754.15.3.el6.x86_64.rpmecf85a00ff62740320126fa082d48e283c090852366444dcca26be1a8704949aELSA-2024-1831ol6_x86_64_latest
python-perf-2.6.32-754.15.3.el6.x86_64.rpmecf85a00ff62740320126fa082d48e283c090852366444dcca26be1a8704949aELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete