ELSA-2019-4531

ELSA-2019-4531 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-02-06

Description


[4.1.12-124.25.1]
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (Tom Lendacky) [Orabug: 28870524] {CVE-2018-3639}
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (Konrad Rzeszutek Wilk) [Orabug: 28870524] {CVE-2018-3639}
- x86/cpufeatures: rename X86_FEATURE_AMD_SSBD to X86_FEATURE_LS_CFG_SSBD (Mihai Carabas) [Orabug: 28870524] {CVE-2018-3639}
- Make file credentials available to the seqfile interfaces (Linus Torvalds) [Orabug: 29114879] {CVE-2018-17972}
- proc: restrict kernel stack dumps to root (Jann Horn) [Orabug: 29114879] {CVE-2018-17972}
- x86/speculation: Clean up retpoline code in bugs.c (Alejandro Jimenez) [Orabug: 29211617]
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (WANG Chao) [Orabug: 29211617]
- x86/build: Fix compiler support check for CONFIG_RETPOLINE (Masahiro Yamada) [Orabug: 29211617]
- x86/retpoline: Remove minimal retpoline support (Zhenzhong Duan) [Orabug: 29211617]
- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support (Zhenzhong Duan) [Orabug: 29211617]
- nl80211: check for the required netlink attributes presence (Vladis Dronov) [Orabug: 29245533] {CVE-2017-12153} {CVE-2017-12153}
- scsi: lpfc: Fix PT2PT PRLI reject (reapply patch) (James Smart) [Orabug: 29281346]


Related CVEs


CVE-2018-3639
CVE-2017-12153
CVE-2018-17972

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.25.1.el6uek.src.rpm4122d8638a009c08030ce2f5e5e53dfb672dbe0b552ed634985bb67eeaed3d8eELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.25.1.el6uek.x86_64.rpm46cdd62c9fff876841b989ef38683cbd7ce004df34bc390238f41839fe8fd7cbELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.25.1.el6uek.x86_64.rpm11495d82ffe4167eb501bb80acea5fb0332140222fef38dd1f8db7a75c1f9712ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.25.1.el6uek.x86_64.rpm86e589bdbed4efc2700eb8787fd41b8cbe4cf9047cb4d6e5f8191eb9d176d41cELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.25.1.el6uek.x86_64.rpm216cc28b171dbab993de3ee0bad6e7c22f49c794b602c5b541bee2ee8edc9958ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.25.1.el6uek.noarch.rpm5453bdf0c125b6b4f411685557b83142349e50f51183e6f92f63ed7451a3d6ffELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.25.1.el6uek.noarch.rpm3f8d9b0b3904e8c077f651132ad173cc8e3d6a0321d9e0a6c582c585899234f4ELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.25.1.el7uek.src.rpm431f84ad76b53256533bfd5293e5586dcf33bc175811f340ca9a225cd1ac5994ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.25.1.el7uek.x86_64.rpm59c3683474d4d986f9f230289a91b302a0db3e22a9037309b7eecbff793736ddELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.25.1.el7uek.x86_64.rpm34c90af4ce67a574853bc741f6a01c7afbf94066f62dbee81a3d23f141627a1cELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.25.1.el7uek.x86_64.rpm90487b0258a8542d2addd5b199f3fbae032dd5b74765cc144874c70c7333ea84ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.25.1.el7uek.x86_64.rpmddb9038f92ba688a9769809d81698534061cec42f8bdf4b116c5991b8ab07b6fELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.25.1.el7uek.noarch.rpm255cd462e3ae82229dc442b5e8362cb063f4d1a317b5dd92b74f3faa6185e6caELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.25.1.el7uek.noarch.rpma95ae4c7dcf1bb96e8b876326574260353c236a575664c1eb7aea217655ca5baELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete