Oracle Linux 6154 Published by

The following updates has been released for Oracle Linux:

ELSA-2018-3522 Important: Oracle Linux 6 spice-server security update
ELSA-2018-4268 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2018-4268 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2018-4269 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update
ELSA-2018-4269 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2018-4265)



ELSA-2018-3522 Important: Oracle Linux 6 spice-server security update

Oracle Linux Security Advisory ELSA-2018-3522

http://linux.oracle.com/errata/ELSA-2018-3522.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:

x86_64:
spice-server-0.12.4-16.el6_10.2.x86_64.rpm
spice-server-devel-0.12.4-16.el6_10.2.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/spice-server-0.12.4-16.el6_10.2.src.rpm



Description of changes:

[0.12.4-16.2]
- Prevent potential buffer/integer overflows with invalid MonitorsConfig
messages
sent from an authenticated client
Resolves: CVE-2017-7506

[0.12.4-16.1]
- Fix flexible array buffer overflow
Resolves: rhbz#1596008

ELSA-2018-4268 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2018-4268

http://linux.oracle.com/errata/ELSA-2018-4268.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-firmware-3.8.13-118.26.1.el6uek.noarch.rpm
kernel-uek-doc-3.8.13-118.26.1.el6uek.noarch.rpm
kernel-uek-3.8.13-118.26.1.el6uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.26.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.26.1.el6uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.26.1.el6uek.x86_64.rpm
dtrace-modules-3.8.13-118.26.1.el6uek-0.4.5-3.el6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-3.8.13-118.26.1.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/dtrace-modules-3.8.13-118.26.1.el6uek-0.4.5-3.el6.src.rpm



Description of changes:

kernel-uek
[3.8.13-118.26.1.el6uek]
- netfilter: xt_TCPMSS: add more sanity tests on tcph->doff (Eric
Dumazet) [Orabug: 27896807] {CVE-2017-18017}
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927692] {CVE-2018-7757}

ELSA-2018-4268 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2018-4268

http://linux.oracle.com/errata/ELSA-2018-4268.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-firmware-3.8.13-118.26.1.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-118.26.1.el7uek.noarch.rpm
kernel-uek-3.8.13-118.26.1.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.26.1.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.26.1.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.26.1.el7uek.x86_64.rpm
dtrace-modules-3.8.13-118.26.1.el7uek-0.4.5-3.el7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-118.26.1.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-118.26.1.el7uek-0.4.5-3.el7.src.rpm



Description of changes:

kernel-uek
[3.8.13-118.26.1.el7uek]
- netfilter: xt_TCPMSS: add more sanity tests on tcph->doff (Eric
Dumazet) [Orabug: 27896807] {CVE-2017-18017}
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927692] {CVE-2018-7757}

ELSA-2018-4269 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2018-4269

http://linux.oracle.com/errata/ELSA-2018-4269.html

The following updated rpms for Oracle Linux 5 Extended Lifecycle Support
(ELS) have been uploaded to the Unbreakable Linux Network:

i386:
kernel-uek-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-debug-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-devel-2.6.39-400.303.1.el5uek.i686.rpm
kernel-uek-doc-2.6.39-400.303.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.303.1.el5uek.noarch.rpm

x86_64:
kernel-uek-firmware-2.6.39-400.303.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.39-400.303.1.el5uek.noarch.rpm
kernel-uek-2.6.39-400.303.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.303.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.303.1.el5uek.x86_64.rpm



Description of changes:

[2.6.39-400.303.1.el5uek]
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927686] {CVE-2018-7757}
- Revert "Fix up non-directory creation in SGID directories" (Brian
Maly) [Orabug: 28781234]


ELSA-2018-4269 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2018-4269

http://linux.oracle.com/errata/ELSA-2018-4269.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
kernel-uek-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-debug-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-devel-2.6.39-400.303.1.el6uek.i686.rpm
kernel-uek-doc-2.6.39-400.303.1.el6uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.303.1.el6uek.noarch.rpm

x86_64:
kernel-uek-firmware-2.6.39-400.303.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.39-400.303.1.el6uek.noarch.rpm
kernel-uek-2.6.39-400.303.1.el6uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.303.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.303.1.el6uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.303.1.el6uek.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.39-400.303.1.el6uek.src.rpm



Description of changes:

[2.6.39-400.303.1.el6uek]
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (Jason Yan)
[Orabug: 27927686] {CVE-2018-7757}


New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2018-4265)

Synopsis: ELSA-2018-4265 can now be patched using Ksplice
CVEs: CVE-2017-13168 CVE-2018-7757

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2018-4265.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-13168: Denial-of-service in sg read/write implementation.

An unsafe implementation of read/write in the sg driver can result in
userspace being able to corrupt Kernel memory. A local user with access
to an sg device could use this flaw to cause undefined behaviour or a
Kernel crash, leading to a denial-of-service.

Orabug: 28824718


* Memory leak in Intel XL710 rx descriptor cleanup.

A failure to properly clean up the rx descriptors in the Intel XL710
driver could lead to a memory leak and possible denial-of-service.

Orabug: 28228724


* CVE-2018-7757: Memory leak when reading invalid_dword_count attribute of SAS Domain Transport driver.

A missing free when reading invalid_dword_count attribute of SAS Domain
Transport driver could lead to a memory leak. A local attacker could use
this flaw to exhaust kernel memory and cause a denial-of-service.

Orabug: 27927687


* Denial-of-service when an I/O error happens while reading OCFS2 block.

A logic error when an I/O error happens while reading OCFS2 block could
lead to a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.

Orabug: 28580543


* Use-after-free while using GRO with Mellanox Technologies 1/10/40Gbit Ethernet driver.

A logic error when using Generic Receive Offload (GRO) with Mellanox
Technologies 1/10/40Gbit Ethernet driver could lead to a use-after-free.
A local attacker could use this flaw to cause a denial-of-service.

Orabug: 28376051


* Invalid memory access during initialization of QLogic QLA2XXX Fibre Channel driver.

A race condition during initialization of QLogic QLA2XXX Fibre Channel
driver could lead to an invalid memory access. A local attacker could
use this flaw to cause a denial-of-service.

Orabug: 28013813


* Denial-of-service when forking a process with hugetlb mappings.

A logic error when forking a process with hugetlb mappings could lead to
a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.

Orabug: 28839992

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.