|
|
Subscribe / Log in / New account

Oracle alert ELSA-2019-3832 (kernel)

From:  Errata Announcements for Oracle Linux <el-errata@oss.oracle.com>
To:  el-errata@oss.oracle.com
Subject:  [El-errata] ELSA-2019-3832 Important: Oracle Linux 8 kernel security update
Date:  Sat, 23 Nov 2019 19:35:26 -0800
Message-ID:  <9d50a068-f1ff-ec08-4d77-5aadb2d8de27@oracle.com>

Oracle Linux Security Advisory ELSA-2019-3832 http://linux.oracle.com/errata/ELSA-2019-3832.html The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network: x86_64: bpftool-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-abi-whitelists-4.18.0-147.0.2.el8_1.noarch.rpm kernel-core-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-cross-headers-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-debug-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-debug-core-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-debug-devel-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-debug-modules-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-debug-modules-extra-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-devel-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-doc-4.18.0-147.0.2.el8_1.noarch.rpm kernel-headers-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-modules-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-modules-extra-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-tools-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-tools-libs-4.18.0-147.0.2.el8_1.x86_64.rpm perf-4.18.0-147.0.2.el8_1.x86_64.rpm python3-perf-4.18.0-147.0.2.el8_1.x86_64.rpm kernel-tools-libs-devel-4.18.0-147.0.2.el8_1.x86_64.rpm aarch64: bpftool-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-abi-whitelists-4.18.0-147.0.2.el8_1.noarch.rpm kernel-core-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-cross-headers-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-debug-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-debug-core-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-debug-devel-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-debug-modules-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-debug-modules-extra-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-devel-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-doc-4.18.0-147.0.2.el8_1.noarch.rpm kernel-headers-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-modules-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-modules-extra-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-tools-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-tools-libs-4.18.0-147.0.2.el8_1.aarch64.rpm perf-4.18.0-147.0.2.el8_1.aarch64.rpm python3-perf-4.18.0-147.0.2.el8_1.aarch64.rpm kernel-tools-libs-devel-4.18.0-147.0.2.el8_1.aarch64.rpm SRPMS: http://oss.oracle.com/ol8/SRPMS-updates/kernel-4.18.0-147... Description of changes: [4.18.0-147.0.2.el8_1.OL8] - Oracle Linux certificates (Alexey Petrenko) - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] [4.18.0-147.0.2.el8_1] - [drm] drm/i915: Lower RM timeout to avoid DSI hard hangs (Dave Airlie) [1766056 1756805] {CVE-2019-0154} - [drm] drm/i915/gen8+: Add RC6 CTX corruption WA (Dave Airlie) [1766056 1756805] {CVE-2019-0154} - [drm] drm/i915/cmdparser: Ignore Length operands during command matching (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915/cmdparser: Add support for backward jumps (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915/cmdparser: Use explicit goto for error paths (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915: Add gen9 BCS cmdparsing (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915: Allow parsing of unsized batches (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915: Add support for mandatory cmdparsing (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915: Remove Master tables from cmdparser (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915: Disable Secure Batches for gen6+ (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [drm] drm/i915: Rename gen7 cmdparser tables (Dave Airlie) [1756871 1756873] {CVE-2019-0155} - [x86] x86/tsx: Add config options to set tsx=on|off|auto (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [documentation] x86/speculation/taa: Add documentation for TSX Async Abort (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [x86] x86/tsx: Add "auto" option to the tsx= cmdline parameter (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [base] x86/speculation/taa: Add sysfs reporting for TSX Async Abort (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [x86] x86/speculation/taa: Add mitigation for TSX Async Abort (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [x86] x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [x86] x86/cpu: Add a helper function x86_read_arch_cap_msr() (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [x86] x86/msr: Add the IA32_TSX_CTRL MSR (Josh Poimboeuf) [1766550 1766551] {CVE-2019-11135} - [documentation] Documentation: Add ITLB_MULTIHIT documentation (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] kvm: x86: mmu: Recovery of shattered NX large pages (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [virt] kvm: Add helper function for creating VM worker threads (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kernel] cpu/speculation: Uninline and export CPU mitigations helpers (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [x86] x86/cpu: Add Tremont to the cpu vulnerability whitelist (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [x86] x86: Add ITLB_MULTIHIT bug infrastructure (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] KVM: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] KVM: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] kvm: mmu: Do not release the page inside mmu_set_spte() (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] kvm: Convert kvm_lock to a mutex (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] KVM: x86/mmu: Reintroduce fast invalidate/zap for flushing memslot (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] Revert "KVM: x86/mmu: Zap only the relevant pages when removing a memslot" (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [kvm] kvm: x86, powerpc: do not allow clearing largepages debugfs entry (Paolo Bonzini) [1698416 1690344] {CVE-2018-12207} - [zstream] switch to zstream (Frantisek Hrbata) _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds