|
|
Subscribe / Log in / New account

Oracle alert ELSA-2019-2473 (kernel)

From:  Errata Announcements for Oracle Linux <el-errata@oss.oracle.com>
To:  el-errata@oss.oracle.com
Subject:  [El-errata] ELSA-2019-2473 Important: Oracle Linux 6 kernel security and bug fix update
Date:  Wed, 14 Aug 2019 07:11:59 -0700
Message-ID:  <fc43a4a8-23e3-7f3e-198c-0aabd99ce2e8@oracle.com>

Oracle Linux Security Advisory ELSA-2019-2473 http://linux.oracle.com/errata/ELSA-2019-2473.html The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network: i386: kernel-2.6.32-754.18.2.el6.i686.rpm kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpm kernel-debug-2.6.32-754.18.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm kernel-devel-2.6.32-754.18.2.el6.i686.rpm kernel-doc-2.6.32-754.18.2.el6.noarch.rpm kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm kernel-headers-2.6.32-754.18.2.el6.i686.rpm perf-2.6.32-754.18.2.el6.i686.rpm python-perf-2.6.32-754.18.2.el6.i686.rpm x86_64: kernel-2.6.32-754.18.2.el6.x86_64.rpm kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpm kernel-debug-2.6.32-754.18.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.18.2.el6.x86_64.rpm kernel-devel-2.6.32-754.18.2.el6.x86_64.rpm kernel-doc-2.6.32-754.18.2.el6.noarch.rpm kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm kernel-headers-2.6.32-754.18.2.el6.x86_64.rpm perf-2.6.32-754.18.2.el6.x86_64.rpm python-perf-2.6.32-754.18.2.el6.x86_64.rpm SRPMS: http://oss.oracle.com/ol6/SRPMS-updates/kernel-2.6.32-754... Description of changes: [2.6.32-754.18.2.el6.OL6] - Update genkey [bug 25599697] [2.6.32-754.18.2.el6] - [x86] x86/speculation: Enable Spectre v1 swapgs mitigations (Waiman Long) [1724512] {CVE-2019-1125} - [x86] x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations (Waiman Long) [1724512] {CVE-2019-1125} [2.6.32-754.18.1.el6] - [virt] xenbus: don't look up transaction IDs for ordinary writes (Vitaly Kuznetsov) [1663262] - [virt] xenbus: don't BUG() on user mode induced condition (Vitaly Kuznetsov) [1663262] - [virt] xenbus: Add proper handling of XS_ERROR from Xenbus for transactions (Vitaly Kuznetsov) [1663262] - [fs] proc: restrict kernel stack dumps to root (Denys Vlasenko) [1638193] {CVE-2018-17972} - [crypto] salsa20 - fix blkcipher_walk API usage (Bruno Eduardo de Oliveira Meneguele) [1543984] - [mm] vmscan: do not loop on too_many_isolated for ever (Rafael Aquini) [1658254] - [x86] spec_ctrl: Don't report the use of retpoline on Skylake as vulnerable (Waiman Long) [1666102] - [mm] try harder to allocate vmemmap blocks (Rafael Aquini) [1591394] - [v4l] dvb: revert spectre v1 mitigation (Josh Poimboeuf) [1647975] - [fs] binfmt_misc.c: do not allow offset overflow (Bill O'Donnell) [1710149] - [x86] pti: Don't use PCID and INVPCID in x86-32 (Waiman Long) [1702782] - [mm] mincore.c: make mincore() more conservative (Rafael Aquini) [1664197] {CVE-2019-5489} - [x86] spec: Move retp_compiler() inline function to bugs.c (Waiman Long) [1722185] _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds