-
Mon Oct 08 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.20.1.el7uek]
- bnxt_en: xdp: don't make drivers report attachment mode (partial backport) (Somasundaram Krishnasamy) [Orabug: 27988326]
- bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (Nikita V. Shirokov) [Orabug: 27988326]
- bnxt_en: add meta pointer for direct access (partial backport) (Somasundaram Krishnasamy) [Orabug: 27988326]
- bnxt_en: Fix bug in ethtool -L. (Michael Chan) [Orabug: 27988326]
- bpf: bnxt: Report bpf_prog ID during XDP_QUERY_PROG (Martin KaFai Lau) [Orabug: 27988326]
- bnxt_en: Optimize doorbell write operations for newer chips (reapply). (Michael Chan) [Orabug: 27988326]
- bnxt_en: Use short TX BDs for the XDP TX ring. (Michael Chan) [Orabug: 27988326]
- bnxt_en: Add ethtool mac loopback self test (reapply). (Michael Chan) [Orabug: 27988326]
- bnxt_en: Add support for XDP_TX action. (Michael Chan) [Orabug: 27988326]
- bnxt_en: Add basic XDP support. (Michael Chan) [Orabug: 27988326]
- x86/ia32: Restore r8 correctly in 32bit SYSCALL instruction entry. (Gayatri Vasudevan) [Orabug: 28529706]
- net: enable RPS on vlan devices (Shannon Nelson) [Orabug: 28645929]
- xen-blkback: hold write vbd-lock while swapping the vbd (Ankur Arora) [Orabug: 28651655]
- xen-blkback: implement swapping of active vbd (Ankur Arora) [Orabug: 28651655]
- xen-blkback: emit active physical device to xenstore (Ankur Arora) [Orabug: 28651655]
- xen-blkback: refactor backend_changed() (Ankur Arora) [Orabug: 28651655]
- xen-blkback: pull out blkif grant features from vbd (Ankur Arora) [Orabug: 28651655]
- mm: get rid of vmacache_flush_all() entirely (Linus Torvalds) [Orabug: 28701016] {CVE-2018-17182}
-
Thu Oct 04 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.9.el7uek]
- rds: crash at rds_ib_inc_copy_to_user+104 due to NULL ptr reference (Venkat Venkatsubra) [Orabug: 28506569]
-
Tue Oct 02 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.8.el7uek]
- IB/core: For multicast functions, verify that LIDs are multicast LIDs (Michael J. Ruhl) [Orabug: 28700490]
-
Sat Sep 29 2018 Jack Vogel <jack.vogel@oracle.com> [4.1.12-124.19.7.el7uek]
- sunrpc: increase UNX_MAXNODENAME from 32 to __NEW_UTS_LEN bytes (Jeff Layton) [Orabug: 28660177]
- net: rds: Use address family to designate IPv4 or IPv6 addresses (Håkon Bugge) [Orabug: 28720071]
- net: rds: Fix blank at eol in af_rds.c (Håkon Bugge) [Orabug: 28720071]
-
Thu Sep 27 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.6.el7uek]
- exec: Limit arg stack to at most 75% of _STK_LIM (Kees Cook) [Orabug: 28709994] {CVE-2018-14634}
-
Tue Sep 25 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.5.el7uek]
- nsfs: mark dentry with DCACHE_RCUACCESS (Cong Wang) [Orabug: 28576290] {CVE-2018-5873}
- dm crypt: add middle-endian variant of plain64 IV (Konrad Rzeszutek Wilk) [Orabug: 28604628]
- IB/ipoib: Improve filtering log message (Yuval Shaia) [Orabug: 28655409]
- IB/ipoib: Fix wrong update of arp_blocked counter (Yuval Shaia) [Orabug: 28655409]
- IB/ipoib: Update RX counters after ACL filtering (Yuval Shaia) [Orabug: 28655409]
- IB/ipoib: Filter RX packets before adding pseudo header (Yuval Shaia) [Orabug: 28655409]
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (Scott Bauer) [Orabug: 28664501] {CVE-2018-16658}
- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (Seunghun Han) [Orabug: 28664577] {CVE-2017-13695}
- uek-rpm: Disable deprecated CONFIG_ACPI_PROCFS_POWER (Victor Erminpour) [Orabug: 28680213]
-
Tue Sep 18 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.4.el7uek]
- Revert "x86/spec_ctrl: Only set SPEC_CTRL_IBRS_FIRMWARE if IBRS is actually in use" (Brian Maly) [Orabug: 28610707]
-
Tue Sep 18 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.3.el7uek]
- btrfs: fix check_shared for fiemap ioctl (Lu Fengqi) [Orabug: 24716710]
- x86/pti: Don't report XenPV as vulnerable (Jiri Kosina) [Orabug: 28476681]
- xfs: give all workqueues rescuer threads (Chris Mason) [Orabug: 28518694]
- x86/spec_ctrl: Only set SPEC_CTRL_IBRS_FIRMWARE if IBRS is actually in use (Patrick Colp) [Orabug: 28274907]
-
Fri Sep 14 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.2.el7uek]
- tcp: add tcp_ooo_try_coalesce() helper (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: call tcp_drop() from tcp_data_queue_ofo() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: detect malicious patterns in tcp_collapse_ofo_queue() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: avoid collapses in tcp_prune_queue() if possible (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: free batches of packets in tcp_prune_ofo_queue() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: use an RB tree for ooo receive queue (Yaogong Wang) [Orabug: 28639707] {CVE-2018-5390}
- tcp: refine tcp_prune_ofo_queue() to not drop all packets (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: introduce tcp_under_memory_pressure() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: increment sk_drops for dropped rx packets (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
-
Wed Sep 05 2018 Brian Maly <brian.maly@oracle.com> [4.1.12-124.19.1.el7uek]
- x86/entry/64: Ensure %ebx handling correct in xen_failsafe_callback (George Kennedy) [Orabug: 28402927] {CVE-2018-14678}
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (Andi Kleen) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (Sean Christopherson) [Orabug: 28488808] {CVE-2018-3620}
- x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled (Guenter Roeck) [Orabug: 28488808] {CVE-2018-3620}
- x86/spectre: Add missing family 6 check to microcode check (Andi Kleen) [Orabug: 28488808] {CVE-2018-3620}
- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (Thomas Gleixner) [Orabug: 28488808] {CVE-2018-3646}
- x86/microcode: Allow late microcode loading with SMT disabled (Josh Poimboeuf) [Orabug: 28488808] {CVE-2018-3620}
- x86/microcode: Do not upload microcode if CPUs are offline (Ashok Raj) [Orabug: 28488808] {CVE-2018-3620}