ELSA-2019-4256

ELSA-2019-4256 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-12-18

Description


[2.6.32-754.25.1.OL6]
- Update genkey [Orabug: 25599697]

[2.6.32-754.25.1]
- [kvm] KVM: VMX: Set VMENTER_L1D_FLUSH_NOT_REQUIRED if !X86_BUG_L1TF (Waiman Long) [1733760]
- [virt] KVM: coalesced_mmio: add bounds checking (Bandan Das) [1746799] {CVE-2019-14821}
- [virt] KVM: MMIO: Lock coalesced device when checking for available entry (Bandan Das) [1746799] {CVE-2019-14821}
- [scsi] scsi: bnx2fc: Handle scope bits when array returns BUSY or TSF (Nilesh Javali) [1749512]
- [scsi] scsi: bnx2fc: remove set but not used variables 'task', 'port', 'orig_task' (Nilesh Javali) [1749512]
- [scsi] scsi: bnx2fc: remove set but not used variables 'lport', 'host' (Nilesh Javali) [1749512]
- [security] KEYS: prevent creating a different user's keyrings (David Howells) [1537371]
- [documentation] Documentation: Add ITLB_MULTIHIT documentation (Paolo Bonzini) [1692385] {CVE-2018-12207}
- [kvm] KVM: introduce no_huge_pages module parameter (Paolo Bonzini) [1692385] {CVE-2018-12207}
- [x86] x86: Add ITLB_MULTIHIT bug infrastructure (Paolo Bonzini) [1692385] {CVE-2018-12207}
- [x86] x86/spec_ctrl/taa: Enable TAA status change after late microcode (Waiman Long) [1766531] {CVE-2019-11135}
- [documentation] x86/speculation/taa: Add documentation for TSX Async Abort (Waiman Long) [1766531] {CVE-2019-11135}
- [base] x86/speculation/taa: Add sysfs reporting for TSX Async Abort (Waiman Long) [1766531] {CVE-2019-11135}
- [x86] x86/speculation/taa: Add mitigation for TSX Async Abort (Waiman Long) [1766531] {CVE-2019-11135}
- [x86] x86/cpu: Add a helper function x86_read_arch_cap_msr() (Waiman Long) [1766531] {CVE-2019-11135}
- [x86] x86/msr: Add the IA32_TSX_CTRL MSR (Waiman Long) [1766531] {CVE-2019-11135}
- [drm] drm/i915/cmdparser: Fix jump whitelist clearing (Denys Vlasenko) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Lower RM timeout to avoid DSI hard hangs (Dave Airlie) [1756824] {CVE-2019-0154}
- [drm] drm/i915/gen8+: Add RC6 CTX corruption WA (Dave Airlie) [1756824] {CVE-2019-0154}
- [drm] drm/i915/cmdparser: Ignore Length operands during command matching (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915/cmdparser: Add support for backward jumps (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Add gen9 BCS cmdparsing (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Allow parsing of unsized batches (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Add support for mandatory cmdparsing (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Remove Master tables from cmdparser (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Disable Secure Batches for gen6+ (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915: Rename gen7 cmdparser tables (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915/gtt: Disable read-only support under GVT (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] erm/i915/gtt: Read-only pages for insert_entries on bdw+ (Dave Airlie) [1756891] {CVE-2019-0155}
- [drm] drm/i915/gtt: Add read only pages to gen8_pte_encode (Dave Airlie) [1756891] {CVE-2019-0155}


Related CVEs


CVE-2019-14821

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-754.25.1.el6.src.rpm6cb5c040d598499bba6348098546b264c5e4ca6c1e1ce163730c3181c28eda5aELSA-2024-1831ol6_i386_latest
kernel-2.6.32-754.25.1.el6.src.rpm6cb5c040d598499bba6348098546b264c5e4ca6c1e1ce163730c3181c28eda5aELSA-2024-1831ol6_u10_i386_patch
kernel-2.6.32-754.25.1.el6.i686.rpm1bc0ec6c335fe9420930419cc728ebd7a7315ddcf9ab8fdd5ec6d021a9886d86ELSA-2024-1831ol6_i386_latest
kernel-2.6.32-754.25.1.el6.i686.rpm1bc0ec6c335fe9420930419cc728ebd7a7315ddcf9ab8fdd5ec6d021a9886d86ELSA-2024-1831ol6_u10_i386_patch
kernel-abi-whitelists-2.6.32-754.25.1.el6.noarch.rpm2e4935073772c5bc4114902849a3e4f8a79bc6832e7bf7e60532997042d17f14ELSA-2024-1831ol6_i386_latest
kernel-abi-whitelists-2.6.32-754.25.1.el6.noarch.rpm2e4935073772c5bc4114902849a3e4f8a79bc6832e7bf7e60532997042d17f14ELSA-2024-1831ol6_u10_i386_patch
kernel-debug-2.6.32-754.25.1.el6.i686.rpm92e0865498f813ea8dc0b782a93e55649ea15e2750285b1fb6c9f511863ab4cbELSA-2024-1831ol6_i386_latest
kernel-debug-2.6.32-754.25.1.el6.i686.rpm92e0865498f813ea8dc0b782a93e55649ea15e2750285b1fb6c9f511863ab4cbELSA-2024-1831ol6_u10_i386_patch
kernel-debug-devel-2.6.32-754.25.1.el6.i686.rpm598e46536d0676348b37aa641fabed6df37323c59a22788bbbfa9eb66af243bdELSA-2024-1831ol6_i386_latest
kernel-debug-devel-2.6.32-754.25.1.el6.i686.rpm598e46536d0676348b37aa641fabed6df37323c59a22788bbbfa9eb66af243bdELSA-2024-1831ol6_u10_i386_patch
kernel-devel-2.6.32-754.25.1.el6.i686.rpm8844621bcd730e37699ef3f227e9bbd96e3ed45bcc4dc6e0b0b9f73dfba23910ELSA-2024-1831ol6_i386_latest
kernel-devel-2.6.32-754.25.1.el6.i686.rpm8844621bcd730e37699ef3f227e9bbd96e3ed45bcc4dc6e0b0b9f73dfba23910ELSA-2024-1831ol6_u10_i386_patch
kernel-doc-2.6.32-754.25.1.el6.noarch.rpmc2dba116f36932f407227febfec3f30b9f0ae639cd88920a5a4f92463d78c61aELSA-2024-1831ol6_i386_latest
kernel-doc-2.6.32-754.25.1.el6.noarch.rpmc2dba116f36932f407227febfec3f30b9f0ae639cd88920a5a4f92463d78c61aELSA-2024-1831ol6_u10_i386_patch
kernel-firmware-2.6.32-754.25.1.el6.noarch.rpm321b3d20b9c2e17b83239b5989516abbd6966b8da1dfa2f0bd6f4da978a31b69ELSA-2024-1831ol6_i386_latest
kernel-firmware-2.6.32-754.25.1.el6.noarch.rpm321b3d20b9c2e17b83239b5989516abbd6966b8da1dfa2f0bd6f4da978a31b69ELSA-2024-1831ol6_u10_i386_patch
kernel-headers-2.6.32-754.25.1.el6.i686.rpm6b6f74133629f55b6b7d8676f6bbefee4e5ef3f7184233fb9f83a66b19651d9bELSA-2024-1831ol6_i386_latest
kernel-headers-2.6.32-754.25.1.el6.i686.rpm6b6f74133629f55b6b7d8676f6bbefee4e5ef3f7184233fb9f83a66b19651d9bELSA-2024-1831ol6_u10_i386_patch
perf-2.6.32-754.25.1.el6.i686.rpm54fd0bf9cd61547073da32a31cf45a922f7dcaa3f341155e889e9b717f35b84dELSA-2024-1831ol6_i386_latest
perf-2.6.32-754.25.1.el6.i686.rpm54fd0bf9cd61547073da32a31cf45a922f7dcaa3f341155e889e9b717f35b84dELSA-2024-1831ol6_u10_i386_patch
python-perf-2.6.32-754.25.1.el6.i686.rpmee6c600fc4b2386a94cd0c899013662d79f8c6e322f30af9cdfa67c6d8314390ELSA-2024-1831ol6_i386_latest
python-perf-2.6.32-754.25.1.el6.i686.rpmee6c600fc4b2386a94cd0c899013662d79f8c6e322f30af9cdfa67c6d8314390ELSA-2024-1831ol6_u10_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-754.25.1.el6.src.rpm6cb5c040d598499bba6348098546b264c5e4ca6c1e1ce163730c3181c28eda5aELSA-2024-1831ol6_u10_x86_64_patch
kernel-2.6.32-754.25.1.el6.src.rpm6cb5c040d598499bba6348098546b264c5e4ca6c1e1ce163730c3181c28eda5aELSA-2024-1831ol6_x86_64_latest
kernel-2.6.32-754.25.1.el6.x86_64.rpmf07367cfd00dd63eaa0e4ac6efd33fbad630bb015ecc0f21c777482a373c21d4ELSA-2024-1831ol6_u10_x86_64_patch
kernel-2.6.32-754.25.1.el6.x86_64.rpmf07367cfd00dd63eaa0e4ac6efd33fbad630bb015ecc0f21c777482a373c21d4ELSA-2024-1831ol6_x86_64_latest
kernel-abi-whitelists-2.6.32-754.25.1.el6.noarch.rpm2e4935073772c5bc4114902849a3e4f8a79bc6832e7bf7e60532997042d17f14ELSA-2024-1831ol6_u10_x86_64_patch
kernel-abi-whitelists-2.6.32-754.25.1.el6.noarch.rpm2e4935073772c5bc4114902849a3e4f8a79bc6832e7bf7e60532997042d17f14ELSA-2024-1831ol6_x86_64_latest
kernel-debug-2.6.32-754.25.1.el6.x86_64.rpmde79331d7b6a4fb72d56ca2b6ef491cf0c6564d3afd0da1b5a5eff80ba961329ELSA-2024-1831ol6_u10_x86_64_patch
kernel-debug-2.6.32-754.25.1.el6.x86_64.rpmde79331d7b6a4fb72d56ca2b6ef491cf0c6564d3afd0da1b5a5eff80ba961329ELSA-2024-1831ol6_x86_64_latest
kernel-debug-devel-2.6.32-754.25.1.el6.i686.rpm598e46536d0676348b37aa641fabed6df37323c59a22788bbbfa9eb66af243bdELSA-2024-1831ol6_u10_x86_64_patch
kernel-debug-devel-2.6.32-754.25.1.el6.i686.rpm598e46536d0676348b37aa641fabed6df37323c59a22788bbbfa9eb66af243bdELSA-2024-1831ol6_x86_64_latest
kernel-debug-devel-2.6.32-754.25.1.el6.x86_64.rpm0d6f467a9e7aeba24aa105d905140b1669bfd4736d651ffbdbf854eeef572b96ELSA-2024-1831ol6_u10_x86_64_patch
kernel-debug-devel-2.6.32-754.25.1.el6.x86_64.rpm0d6f467a9e7aeba24aa105d905140b1669bfd4736d651ffbdbf854eeef572b96ELSA-2024-1831ol6_x86_64_latest
kernel-devel-2.6.32-754.25.1.el6.x86_64.rpmee05f049d603fbb7ab8ae32507e4e9ff541d2359d9f73f6834ee2c550fb0d449ELSA-2024-1831ol6_u10_x86_64_patch
kernel-devel-2.6.32-754.25.1.el6.x86_64.rpmee05f049d603fbb7ab8ae32507e4e9ff541d2359d9f73f6834ee2c550fb0d449ELSA-2024-1831ol6_x86_64_latest
kernel-doc-2.6.32-754.25.1.el6.noarch.rpmc2dba116f36932f407227febfec3f30b9f0ae639cd88920a5a4f92463d78c61aELSA-2024-1831ol6_u10_x86_64_patch
kernel-doc-2.6.32-754.25.1.el6.noarch.rpmc2dba116f36932f407227febfec3f30b9f0ae639cd88920a5a4f92463d78c61aELSA-2024-1831ol6_x86_64_latest
kernel-firmware-2.6.32-754.25.1.el6.noarch.rpm321b3d20b9c2e17b83239b5989516abbd6966b8da1dfa2f0bd6f4da978a31b69ELSA-2024-1831ol6_u10_x86_64_patch
kernel-firmware-2.6.32-754.25.1.el6.noarch.rpm321b3d20b9c2e17b83239b5989516abbd6966b8da1dfa2f0bd6f4da978a31b69ELSA-2024-1831ol6_x86_64_latest
kernel-headers-2.6.32-754.25.1.el6.x86_64.rpm322e12a18ee4ca5e6e8e2a5703a8e1c6d1fc7bda24971ea46cb65a4bb9c428bbELSA-2024-1831ol6_u10_x86_64_patch
kernel-headers-2.6.32-754.25.1.el6.x86_64.rpm322e12a18ee4ca5e6e8e2a5703a8e1c6d1fc7bda24971ea46cb65a4bb9c428bbELSA-2024-1831ol6_x86_64_latest
perf-2.6.32-754.25.1.el6.x86_64.rpm398f3c7b4bd954aee8972abf1e98e5d9c5c988e6fac95715e6d44f568cc82663ELSA-2024-1831ol6_u10_x86_64_patch
perf-2.6.32-754.25.1.el6.x86_64.rpm398f3c7b4bd954aee8972abf1e98e5d9c5c988e6fac95715e6d44f568cc82663ELSA-2024-1831ol6_x86_64_latest
python-perf-2.6.32-754.25.1.el6.x86_64.rpme9c3a6127174036aa7395d15c5e5660735256c6c8ae63885d1427c09afdf34c5ELSA-2024-1831ol6_u10_x86_64_patch
python-perf-2.6.32-754.25.1.el6.x86_64.rpme9c3a6127174036aa7395d15c5e5660735256c6c8ae63885d1427c09afdf34c5ELSA-2024-1831ol6_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete