[ELSA-2019-1479] kernel security and bug fix update

Severity Important
Affected Packages 20
CVEs 4

[4.18.0-80.4.2_0.OL8]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]

[4.18.0-80.4.2_0]
- [net] tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (Florian Westphal) [1719922 1719923] {CVE-2019-11479}
- [net] tcp: add tcp_min_snd_mss sysctl (Florian Westphal) [1719922 1719923] {CVE-2019-11479}
- [net] tcp: tcp_fragment() should apply sane memory limits (Florian Westphal) [1719857 1719858] {CVE-2019-11478}
- [net] tcp: limit payload size of sacked skbs (Florian Westphal) [1719602 1719603] {CVE-2019-11477}

[4.18.0-80.4.1_0]
- [netdrv] ice: Do autoneg based on VSI state (Jonathan Toppins) [1709433 1687903]
- [arm64] arm64: apply workaround on A64FX v1r0 (Mark Langsdorf) [1700901 1692306]
- [arm64] arm64/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [s390] s390/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [powerpc] powerpc/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [powerpc] powerpc/64: Disable the speculation barrier from the command line (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add 'mitigations=' support for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [kernel] cpu/speculation: Add 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Fix comment (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add SMT warning message (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation: Move arch_smt_update() call to after mitigation decisions (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add mds=full, nosmt cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [documentation] Documentation: Add MDS vulnerability documentation (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [documentation] Documentation: Move L1TF to separate directory (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add mitigation mode VMWERV (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add sysfs reporting for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add mitigation control for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Clear CPU buffers on exit to user (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add mds_clear_cpu_buffers() (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [kvm] x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add BUG_MSBDS_ONLY (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation/mds: Add basic bug infrastructure for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation: Consolidate CPU whitelists (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/msr-index: Cleanup bit defines (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/speculation: Cast ~SPEC_CTRL_STIBP atomic value to int (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [x86] x86/cpu: Sanitize FAM6_ATOM naming (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
file (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
- [tools] tools include: Adopt linux/bits.h (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}

[4.18.0-80.3.1_0]
- [mm] mm: enforce min addr even if capable() in expand_downwards() (Rafael Aquini) [1708829 1687667] {CVE-2019-9213}
- [powerpc] powerpc/radix: Fix kernel crash with mremap() (Steve Best) [1708617 1674186]
- [powerpc] powerpc/security: Fix spectre_v2 reporting (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc/powernv: Query firmware for count cache flush settings (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc/pseries: Query hypervisor for count cache flush settings (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc/64s: Add support for software count cache flush (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc/64s: Add new security feature flags for count cache flush (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc/asm: Add a patch_site macro & helpers for patching instructions (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc/64: Call setup_barrier_nospec() from setup_arch() (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (Gustavo Duarte) [1708112 1694456]
- [powerpc] powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (Gustavo Duarte) [1708112 1694456]
- [of] of: __of_detach_node() - remove node from phandle cache (Steve Best) [1708102 1669198]
- [of] of: of_node_get()/of_node_put() nodes held in phandle cache (Steve Best) [1708102 1669198]
- [fs] debugfs: Fix EPERM regression from kernel lockdown check (Lenny Szubowicz) [1708100 1686755]
- [block] nvme: lock NS list changes while handling command effects (David Milburn) [1701140 1672759]

[4.18.0-80.2.1_0]
- [netdrv] qed: Fix qed_mcp_halt|resume() (Manish Chopra) [1704184 1697310]
- [cpufreq] cpufreq: intel_pstate: Also use CPPC nominal_perf for base_frequency (Prarit Bhargava) [1706739 1696131]
- [acpi] ACPI / CPPC: Fix guaranteed performance handling (Prarit Bhargava) [1706739 1696131]
- [arm64] arm64: Add workaround for Fujitsu A64FX erratum 010001 (Mark Langsdorf) [1700902 1666951]
- [s390] vfio_ap: link the vfio_ap devices to the vfio_ap bus subsystem (Cornelia Huck) [1700290 1686044]
- [netdrv] net/mlx4_en: Force CHECKSUM_NONE for short ethernet frames (Alaa Hleihel) [1700289 1651509]
- [netdrv] net/mlx5e: Force CHECKSUM_UNNECESSARY for short ethernet frames (Alaa Hleihel) [1700289 1651509]
- [pci] PCI: pciehp: Fix re-enabling the slot marked for safe removal (Myron Stowe) [1700288 1695922]

Package Affected Version
pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.0 < 4.18.0-80.4.2.el8_0
ID
ELSA-2019-1479
Severity
important
URL
https://linux.oracle.com/errata/ELSA-2019-1479.html
Published
2019-07-30T00:00:00
(5 years ago)
Modified
2019-07-30T00:00:00
(5 years ago)
Rights
Copyright 2019 Oracle, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.0 oraclelinux python3-perf < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.0 oraclelinux perf < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.0 oraclelinux kernel < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.0 oraclelinux kernel-tools < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.0 oraclelinux kernel-tools-libs < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.0 oraclelinux kernel-tools-libs-devel < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.0 oraclelinux kernel-modules < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.0 oraclelinux kernel-modules-extra < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.0 oraclelinux kernel-headers < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.0 oraclelinux kernel-doc < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.0 oraclelinux kernel-devel < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.0 oraclelinux kernel-debug < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.0 oraclelinux kernel-debug-modules < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.0 oraclelinux kernel-debug-modules-extra < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.0 oraclelinux kernel-debug-devel < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.0 oraclelinux kernel-debug-core < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.0 oraclelinux kernel-cross-headers < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.0 oraclelinux kernel-core < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-8.0 oraclelinux kernel-abi-whitelists < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
Affected pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.0 oraclelinux bpftool < 4.18.0-80.4.2.el8_0 oraclelinux-8.0
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...