Oracle Linux 6167 Published by

A kernel security and bug fix update has been released for Oracle Linux 6.



El-errata: ELSA-2020-2430 Moderate: Oracle Linux 6 kernel security and bug fix update


Oracle Linux Security Advisory ELSA-2020-2430

  http://linux.oracle.com/errata/ELSA-2020-2430.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
kernel-2.6.32-754.30.2.el6.i686.rpm
kernel-abi-whitelists-2.6.32-754.30.2.el6.noarch.rpm
kernel-debug-2.6.32-754.30.2.el6.i686.rpm
kernel-debug-devel-2.6.32-754.30.2.el6.i686.rpm
kernel-devel-2.6.32-754.30.2.el6.i686.rpm
kernel-doc-2.6.32-754.30.2.el6.noarch.rpm
kernel-firmware-2.6.32-754.30.2.el6.noarch.rpm
kernel-headers-2.6.32-754.30.2.el6.i686.rpm
perf-2.6.32-754.30.2.el6.i686.rpm
python-perf-2.6.32-754.30.2.el6.i686.rpm

x86_64:
kernel-2.6.32-754.30.2.el6.x86_64.rpm
kernel-abi-whitelists-2.6.32-754.30.2.el6.noarch.rpm
kernel-debug-2.6.32-754.30.2.el6.x86_64.rpm
kernel-debug-devel-2.6.32-754.30.2.el6.i686.rpm
kernel-debug-devel-2.6.32-754.30.2.el6.x86_64.rpm
kernel-devel-2.6.32-754.30.2.el6.x86_64.rpm
kernel-doc-2.6.32-754.30.2.el6.noarch.rpm
kernel-firmware-2.6.32-754.30.2.el6.noarch.rpm
kernel-headers-2.6.32-754.30.2.el6.x86_64.rpm
perf-2.6.32-754.30.2.el6.x86_64.rpm
python-perf-2.6.32-754.30.2.el6.x86_64.rpm

SRPMS:
  http://oss.oracle.com/ol6/SRPMS-updates/kernel-2.6.32-754.30.2.el6.src.rpm


Description of changes:

[2.6.32-754.30.2.el6.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.30.2.el6]
- x86/speculation: Provide SRBDS late microcode loading support (Waiman
Long)
- [documentation] x86/speculation: Add Ivy Bridge to affected list
(Waiman Long) [1827185] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and
mitigation documentation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling
(SRBDS) mitigation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long)
[1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman
Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long)
[1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827185]
{CVE-2020-0543}
- [x86] x86/devicetable: Move x86 specific macro out of generic code
(Waiman Long) [1827185] {CVE-2020-0543}

[2.6.32-754.30.1.el6]
- [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827226]
{CVE-2020-10711}
- [netdrv] bonding: don't set slave->link in bond_update_speed_duplex()
(Patrick Talbert) [1828604]
- [security] KEYS: prevent KEYCTL_READ on negative key (Patrick Talbert)
[1498368] {CVE-2017-12192}