ELSA-2019-4596

ELSA-2019-4596 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-03-31

Description


[4.1.12-124.26.7]
- ib_core: initialize shpd field when allocating 'struct ib_pd' (Mukesh Kacker) [Orabug: 29384815]
- Revert 'x86/apic: Make arch_setup_hwirq NUMA node aware' (Brian Maly) [Orabug: 29542185]
- qlcnic: fix Tx descriptor corruption on 82xx devices (Shahed Shaikh) [Orabug: 27708787]
- block: Fix a race between blk_cleanup_queue() and timeout handling (Bart Van Assche) [Orabug: 29158186]
- can: gw: ensure DLC boundaries after CAN frame modification (Oliver Hartkopp) [Orabug: 29215299] {CVE-2019-3701} {CVE-2019-3701}
- CIFS: Enable encryption during session setup phase (Pavel Shilovsky) [Orabug: 29338239] {CVE-2018-1066}
- ext4: clear i_data in ext4_inode_info when removing inline data (Theodore Ts'o) [Orabug: 29540709] {CVE-2018-10881} {CVE-2018-10881}
- ext4: add more inode number paranoia checks (Theodore Ts'o) [Orabug: 29545566] {CVE-2018-10882} {CVE-2018-10882}
- Revert 'KVM: nVMX: Eliminate vmcs02 pool' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'KVM: VMX: introduce alloc_loaded_vmcs' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'KVM: VMX: make MSR bitmaps per-VCPU' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'KVM: x86: pass host_initiated to functions that read MSRs' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'KVM/x86: Add IBPB support' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL - reloaded' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'KVM: SVM: Add MSR-based feature support for serializing LFENCE' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'x86/cpufeatures: rename X86_FEATURE_AMD_SSBD to X86_FEATURE_LS_CFG_SSBD' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'x86/bugs: Add AMD's SPEC_CTRL MSR usage' (Boris Ostrovsky) [Orabug: 29542029]
- Revert 'x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR' (Boris Ostrovsky) [Orabug: 29542029]
- arch: x86: remove unsued SET_IBPB from spec_ctrl.h (Mihai Carabas) [Orabug: 29336760]
- x86: cpu: microcode: fix late loading SpectreV2 bugs eval (Mihai Carabas) [Orabug: 29336760]
- x86: cpu: microcode: fix late loading SSBD and L1TF bugs eval (Mihai Carabas) [Orabug: 29336760]
- x86: cpu: microcode: Re-evaluate bugs in a CPU after microcode loading (Mihai Carabas) [Orabug: 29336760]
- x86: cpu: microcode: update flags for all cpus (Mihai Carabas) [Orabug: 29336760]

[4.1.12-124.26.6]
- x86/apic: Make arch_setup_hwirq NUMA node aware (Henry Willard) [Orabug: 29292411]


Related CVEs


CVE-2018-10881
CVE-2019-3701
CVE-2018-10882
CVE-2018-1066

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.26.7.el6uek.src.rpmd0322f011a89a7d40f3c69303093c1b4c8115e74ba314842fd5b68e67755e794ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.26.7.el6uek.x86_64.rpm51ab3d5ada7671d126c84f861e92ad0d085991a1f3e15073caab1a4a995a0deaELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.26.7.el6uek.x86_64.rpmb66267de1123dadfe0d24eb03616bd44e91edf280ac8e68521fe49638d954cf1ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.26.7.el6uek.x86_64.rpmeceae61d53ae17fdda733efe5453e5ad666ab467aee62145462ee47c2b3c4a03ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.26.7.el6uek.x86_64.rpm9ea1dd790648aad7ac358f9015604dd764dcd36274cc307890c510b5b494be63ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.26.7.el6uek.noarch.rpm6f5fe08b3f1d03bafaf4b37f6334517b335b7a6bd9f915951ffe91b60224f00bELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.26.7.el6uek.noarch.rpm214cbe0c470a3f6a40a73adec56768737b0e8387ac3b6cb8f204f01d3e30c018ELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.26.7.el7uek.src.rpm732877b1129683bfe8a49a44a21f88a12f487182971478a6d5d22637b5c73139ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.26.7.el7uek.x86_64.rpmc67677c987f6b0202f0a3e80e8f808031b328418fc551b04b6b5816ab3599de1ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.26.7.el7uek.x86_64.rpm20a2638e6a9ad4f9d295134473822fe0c424668b85e18bcd167f1bbcbba34321ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.26.7.el7uek.x86_64.rpmc337452f2d32303d9f52d7371851747bc0efb35c271ed397beb33be43fcf8fe3ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.26.7.el7uek.x86_64.rpm072f5ebf33039fe43d9bb36f7af0f753794d2455b37f7c51315933574887a40cELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.26.7.el7uek.noarch.rpmc70a5a4c2c99893ae2c605894d412aca94332e8f1f647e303312564d58e6ee18ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.26.7.el7uek.noarch.rpma578c2095c356e5bba81438f98c3c4d945812cbad18c1d1ad47f7e502cba9f75ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete