[ELSA-2019-4855] Unbreakable Enterprise kernel security update

Severity Important
Affected Packages 12
CVEs 7

[2.6.39-400.316.1]
- ipv4: ipmr: various fixes and cleanups (Eric Dumazet) [Orabug: 30183226] {CVE-2017-18509}
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (Hannes Reinecke) [Orabug: 30393903] {CVE-2017-14991}
- usb: misc: legousbtower: Fix NULL pointer deference (Greg Kroah-Hartman) [Orabug: 30412152] {CVE-2017-15102}
- floppy: fix div-by-zero in setup_format_params (Denis Efremov) [Orabug: 30447845] {CVE-2019-14284}
- i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (Jeremy Compostella) [Orabug: 30468843] {CVE-2017-18551}
- USB: check usb_get_extra_descriptor for proper size (Mathias Payer) [Orabug: 30057430] {CVE-2018-20169}
- x86/tsx: Add config options to set tsx=on|off|auto (Michal Hocko) [Orabug: 30419231] {CVE-2019-11135}
- x86/speculation/taa: Add documentation for TSX Async Abort (Pawan Gupta) [Orabug: 30419231] {CVE-2019-11135}
- x86/tsx: Add 'auto' option to TSX cmdline parameter (Pawan Gupta) [Orabug: 30419231] {CVE-2019-11135}
- x86/speculation/taa: Add sysfs reporting for TSX Async Abort (Pawan Gupta) [Orabug: 30419231] {CVE-2019-11135}
- x86/speculation/taa: Add mitigation for TSX Async Abort (Pawan Gupta) [Orabug: 30419231] {CVE-2019-11135}
- x86/tsx: Add TSX cmdline option with TSX disabled by default (Pawan Gupta) [Orabug: 30419231] {CVE-2019-11135}
- x86: Add helper function x86_read_arch_cap_msr() (Pawan Gupta) [Orabug: 30419231] {CVE-2019-11135}
- x86/tsx: Add enumeration support for IA32_TSX_CTRL MSR (Pawan Gupta) [Orabug: 30419231] {CVE-2019-11135}

ID
ELSA-2019-4855
Severity
important
URL
https://linux.oracle.com/errata/ELSA-2019-4855.html
Published
2019-11-21T00:00:00
(4 years ago)
Modified
2019-11-21T00:00:00
(4 years ago)
Rights
Copyright 2019 Oracle, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 oraclelinux kernel-uek < 2.6.39-400.316.1.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 oraclelinux kernel-uek < 2.6.39-400.316.1.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 oraclelinux kernel-uek-firmware < 2.6.39-400.316.1.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 oraclelinux kernel-uek-firmware < 2.6.39-400.316.1.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 oraclelinux kernel-uek-doc < 2.6.39-400.316.1.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 oraclelinux kernel-uek-doc < 2.6.39-400.316.1.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 oraclelinux kernel-uek-devel < 2.6.39-400.316.1.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 oraclelinux kernel-uek-devel < 2.6.39-400.316.1.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 oraclelinux kernel-uek-debug < 2.6.39-400.316.1.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 oraclelinux kernel-uek-debug < 2.6.39-400.316.1.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 oraclelinux kernel-uek-debug-devel < 2.6.39-400.316.1.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 oraclelinux kernel-uek-debug-devel < 2.6.39-400.316.1.el5uek oraclelinux-5
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...