Kmod-Redhat-Ena and UEKR2 Updates for Oracle Linux
Posted on: 01/12/2019 08:32 AM

The following two updates are available for Oracle Linux:

ELEA-2019-0042 Oracle Linux 7 kmod-redhat-ena
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2019-4317)

ELEA-2019-0042 Oracle Linux 7 kmod-redhat-ena
Oracle Linux Enhancement Advisory ELEA-2019-0042

http://linux.oracle.com/errata/ELEA-2019-0042.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kmod-redhat-ena-2.0.2K_dup7.6-2.0.1.el7_6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kmod-redhat-ena-2.0.2K_dup7.6-2.0.1.el7_6.src.rpm



Description of changes:

[2.0.2K_dup7.6-2.0.1]
- add RHCK signature

[2.0.2K_dup7.6-2]
- baf6ab56eb2d596f7d4c6c1e1ccd8a73db6e1c94
- Resolves: #bz1659505
- ena module for Driver Update Program


New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2019-4317)
Synopsis: ELSA-2019-4317 can now be patched using Ksplice
CVEs: CVE-2016-3841 CVE-2017-14051 CVE-2017-17450 CVE-2018-1000004 CVE-2018-1092
CVE-2018-9516

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2019-4317.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR2 2.6.39 on
OL5 and OL6 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2018-9516: Denial-of-service in Bluetooth HIDP debug events.

Missing bounds checks in the Bluetooth HIDP debugfs functions could
result in an out of bounds access and kernel crash, triggerable by a
privileged user.

Orabug: 29128174


* CVE-2017-17450: Unprivileged access to netlink namespaces.

A missing permission check in the netfilter xt_osf code allows an
unprivileged user to create user and net namespaces without the proper
permissions.

Orabug: 29037833


* Improved fix for CVE-2018-1000004: Denial-of-service in ALSA sequencer.

A race condition in the ALSA sequencer subsystem leads to use-after-free
and subsequent memory corruption. This could allow an attacker to cause
a denial-of-service and possibly escalate privilege.

Orabug: 29005191


* CVE-2018-1092: NULL pointer dereference when using unallocated root directory
on ext4 filesystem.

A missing check when using unallocated root directory on ext4 filesystem
could lead to a NULL pointer dereference. A local attacker could mount a
crafted ext4 filesystem and cause a denial-of-service.


* CVE-2017-14051: Denial-of-service in qla2xxx sysfs handler.

A failure to validate information from userspace can result in an
unbounded kernel memory allocation. A local user could use this flaw to
cause memory exhaustion or a kernel crash, resulting in a
denial-of-service.

Orabug: 28220492


* CVE-2016-3841: Use-after-free accessing the IPv6 transmit options.

Incorrect locking when accessing the IPv6 options in various places in the
network stack could lead to a user-after-free on concurrent destruction. A
local user could use this flaw to cause a denial-of-service or potentially
escalate privileges.

Orabug: 25059185

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.







Printed from Linux Compatible (https://www.linuxcompatible.org/news/story/kmod_redhat_ena_and_uekr2_updates_for_oracle_linux.html)