Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-05-02 |
kernel-uek
[3.8.13-118.20.6]
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (Linus Torvalds) [Orabug: 27947608] {CVE-2018-100199}
[3.8.13-118.20.5]
- x86/microcode: probe CPU features on microcode update (Ankur Arora) [Orabug: 27806667]
- x86/microcode: microcode_write() should not reference boot_cpu_data (Ankur Arora) [Orabug: 27806667]
- x86/cpufeatures: use cpu_data in init_scattered_cpuid_flags() (Ankur Arora) [Orabug: 27806667]
[3.8.13-118.20.4]
- Drivers: hv: fcopy: set .owner reference for file operations (Joe Jin) [Orabug: 21191022]
- ALSA: usb-audio: Kill stray URB at exiting (Takashi Iwai) [Orabug: 27148281] {CVE-2017-16527}
- HID: usbhid: fix out-of-bounds bug (Jaejoong Kim) [Orabug: 27207929] {CVE-2017-16533}
- [media] cx231xx-cards: fix NULL-deref on missing association descriptor (Johan Hovold) [Orabug: 27208072] {CVE-2017-16536}
- net: cdc_ether: fix divide by 0 on bad descriptors (Bjorn Mork) [Orabug: 27215201] {CVE-2017-16649}
- x86/microcode/intel: Extend BDW late-loading with a revision check (Jia Zhang) [Orabug: 27343577]
- x86/microcode/intel: Disable late loading on model 79 (Borislav Petkov) [Orabug: 27343577]
- Bluetooth: bnep: bnep_add_connection() should verify that its dealing with l2cap socket (Al Viro) [Orabug: 27344793] {CVE-2017-15868}
- Bluetooth: hidp: verify l2cap sockets (David Herrmann) [Orabug: 27344793] {CVE-2017-15868}
- ALSA: pcm: prevent UAF in snd_pcm_info (Robb Glasser) [Orabug: 27344843] {CVE-2017-0861} {CVE-2017-0861}
- ptrace: use fsuid, fsgid, effective creds for fs access checks (Jann Horn) [Orabug: 27364691] {CVE-2017-14140}
- sctp: do not peel off an assoc from one netns to another one (Xin Long) [Orabug: 27387001] {CVE-2017-15115}
- Revert 'x86/spec_ctrl: Add 'nolfence' knob to disable fallback for spectre_v2 mitigation' (Ankur Arora) [Orabug: 27601787] {CVE-2017-5715}
- Revert 'x86/spec: Add 'lfence_enabled' in sysfs' (Ankur Arora) [Orabug: 27601787] {CVE-2017-5715}
- Revert 'x86/mitigation/spectre_v2: Add reporting of 'lfence'' (Ankur Arora) [Orabug: 27601787] {CVE-2017-5715}
- x86/mitigation/spectre_v2: Add reporting of 'lfence' (Konrad Rzeszutek Wilk) {CVE-2017-5715}
- x86/spec: Add 'lfence_enabled' in sysfs (Konrad Rzeszutek Wilk) {CVE-2017-5715}
- x86/spec_ctrl: Add 'nolfence' knob to disable fallback for spectre_v2 mitigation (Konrad Rzeszutek Wilk) {CVE-2017-5715}
- x86/spectre: bring spec_ctrl management logic closer to UEK4 (Ankur Arora) [Orabug: 27516512] {CVE-2017-5715}
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (David Woodhouse) [Orabug: 27516357] {CVE-2017-5715}
- x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes (Darren Kenny) [Orabug: 27516419] {CVE-2017-5715}
- x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes (David Woodhouse) [Orabug: 27516419] {CVE-2017-5715}
- x86: intel-family.h: Add GEMINI_LAKE SOC (Len Brown) [Orabug: 27516419]
- x86/cpu/intel: Introduce macros for Intel family numbers (Dave Hansen) [Orabug: 27516419]
- x86/spectre: expose 'stibp' (Konrad Rzeszutek Wilk) [Orabug: 27516419] {CVE-2017-5715}
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (David Woodhouse) [Orabug: 27516379] {CVE-2017-5715}
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (Tim Chen) [Orabug: 27516379] {CVE-2017-5715}
- x86/spectre: fix spectre_v1 mitigation indicators (Ankur Arora) [Orabug: 27509932] {CVE-2017-5715}
- x86/ia32/syscall: Clear extended registers %r8-%r15 (Ankur Arora) [Orabug: 27452028] {CVE-2017-5715}
- x86/ia32/syscall: Save full stack frame throughout the entry code (Ankur Arora) [Orabug: 27452028] {CVE-2017-5715}
- x86/ia32/syscall: cleanup trailing whitespace (Ankur Arora) [Orabug: 27452028] {CVE-2017-5715}
- x86/syscall: Clear callee saved registers (%r12-%r15, %rbp, %rbx) (Ankur Arora) [Orabug: 27452028] {CVE-2017-5715}
- x86/syscall: Save callee saved registers on syscall entrance (Ankur Arora) [Orabug: 27452028] {CVE-2017-5715}
CVE-2018-100199 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | dtrace-modules-3.8.13-118.20.6.el6uek-0.4.5-3.el6.src.rpm | 6962c2970f4ecd58f3240ee9668f9668 | - |
kernel-uek-3.8.13-118.20.6.el6uek.src.rpm | ac610164b68a113ec3b484defdeb4c5e | ELSA-2021-9215 | |
dtrace-modules-3.8.13-118.20.6.el6uek-0.4.5-3.el6.x86_64.rpm | 0cd25c894761d1b1ecc4cfe98752ea63 | - | |
kernel-uek-3.8.13-118.20.6.el6uek.x86_64.rpm | 03484e35a0bda864a5a5f5ef792f0837 | ELSA-2021-9215 | |
kernel-uek-debug-3.8.13-118.20.6.el6uek.x86_64.rpm | e6f47f23bbe727a98be32bb1b12898b1 | ELSA-2021-9215 | |
kernel-uek-debug-devel-3.8.13-118.20.6.el6uek.x86_64.rpm | b1726e834fa5f6d4ab0076746c86fc70 | ELSA-2021-9215 | |
kernel-uek-devel-3.8.13-118.20.6.el6uek.x86_64.rpm | b6fe63ffe9c8a82e9c27a7d626ff4d73 | ELSA-2021-9215 | |
kernel-uek-doc-3.8.13-118.20.6.el6uek.noarch.rpm | e7af54ba26548a94521c2195f830a0c4 | ELSA-2021-9215 | |
kernel-uek-firmware-3.8.13-118.20.6.el6uek.noarch.rpm | 773b66f635f472bd994c22b8b55fd2bf | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | dtrace-modules-3.8.13-118.20.6.el7uek-0.4.5-3.el7.src.rpm | b6f41cca09a4c48eff88dfed6c438a14 | - |
kernel-uek-3.8.13-118.20.6.el7uek.src.rpm | d96c725df81bd1d425cd47471d7b05ae | ELSA-2021-9220 | |
dtrace-modules-3.8.13-118.20.6.el7uek-0.4.5-3.el7.x86_64.rpm | 6cbcb333ef56c2109de31beb9b6c1766 | - | |
kernel-uek-3.8.13-118.20.6.el7uek.x86_64.rpm | 4ec4170893b81f61d78a2bc8e771a78c | ELSA-2021-9220 | |
kernel-uek-debug-3.8.13-118.20.6.el7uek.x86_64.rpm | a32bd51f255b92274d83d9e6f7754e9f | ELSA-2021-9220 | |
kernel-uek-debug-devel-3.8.13-118.20.6.el7uek.x86_64.rpm | 1244d497adbc014ec9eb13d8ecf5357f | ELSA-2021-9220 | |
kernel-uek-devel-3.8.13-118.20.6.el7uek.x86_64.rpm | 295a3a393e63bb8c7775be4844cfcdb9 | ELSA-2021-9220 | |
kernel-uek-doc-3.8.13-118.20.6.el7uek.noarch.rpm | 6d84d7f1161d7c2f769f3c6b64dd54a8 | ELSA-2021-9220 | |
kernel-uek-firmware-3.8.13-118.20.6.el7uek.noarch.rpm | 9794028cabb9b0cd81883cc809748deb | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team