Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-05-22 |
[2.6.32-696.30.1.OL6]
- Update genkey [bug 25599697]
[2.6.32-696.30.1]
- [x86] x86/kvm: fix CPUID_7_EDX (word 18) mask (Jan Stancek) [1566893 1566899] {CVE-2018-3639}
[2.6.32-696.29.1]
- [x86] x86/spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/bugs: Rename _RDS to _SSBD (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [kernel] prctl: Add speculation control prctls (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/kvm: Expose the RDS bit to the guest (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requested (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/bugs: Expose the /sys/../spec_store_bypass and X86_BUG_SPEC_STORE_BYPASS (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] cpu/intel: Knight Mill and Moorefield update to intel-family.h (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/speculation: Update Speculation Control microcode blacklist (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/cpuid: Fix up 'virtual' IBRS/IBPB/STIBP feature bits on Intel (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/cpufeatures: Clean up Spectre v2 related CPUID flags (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/cpufeatures: Add AMD feature bits for Speculation Control (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/cpufeatures: Add Intel feature bits for Speculation (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] x86/cpu: Fill in feature word 13, CPUID_8000_0008_EBX (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] Extend RH cpuinfo to 10 extra words (Waiman Long) [1566893 1566899] {CVE-2018-3639}
- [x86] kpti/kexec: fix wrong page address in clear_page (Dave Young) [1573176 1572487]
CVE-2018-3639 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (i386) | kernel-2.6.32-696.30.1.el6.src.rpm | 5c6843d2c7c112597fbbc32b46eb809b | ELSA-2021-9212 |
kernel-2.6.32-696.30.1.el6.i686.rpm | d344e8510fb9db67ee61099c2480b2af | ELSA-2021-9212 | |
kernel-abi-whitelists-2.6.32-696.30.1.el6.noarch.rpm | fb8abf927c8a65e8f7d73ccce0b0abb5 | ELSA-2021-9212 | |
kernel-debug-2.6.32-696.30.1.el6.i686.rpm | 3306eda15b446587735e103f15a44a13 | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-696.30.1.el6.i686.rpm | b97d2821fe05de0e62c5c866b59cb8d4 | ELSA-2021-9212 | |
kernel-devel-2.6.32-696.30.1.el6.i686.rpm | ad4aa059eafeee32c7b9f5fd068b49fa | ELSA-2021-9212 | |
kernel-doc-2.6.32-696.30.1.el6.noarch.rpm | 7637944f0c5ad705acccbdb47d580fc0 | ELSA-2021-9212 | |
kernel-firmware-2.6.32-696.30.1.el6.noarch.rpm | 303d1bb417b6c5ecb38fed21e59c6f42 | ELSA-2021-9212 | |
kernel-headers-2.6.32-696.30.1.el6.i686.rpm | 511d4bddff3bd12ffe54ead4381cfaf5 | ELSA-2021-9212 | |
perf-2.6.32-696.30.1.el6.i686.rpm | 03486a671ffc4983f00c66d51e14e634 | ELSA-2021-9212 | |
python-perf-2.6.32-696.30.1.el6.i686.rpm | 60379f82b22a76062cd2860ce04390f8 | ELSA-2021-9212 | |
Oracle Linux 6 (x86_64) | kernel-2.6.32-696.30.1.el6.src.rpm | 5c6843d2c7c112597fbbc32b46eb809b | ELSA-2021-9212 |
kernel-2.6.32-696.30.1.el6.x86_64.rpm | 7f5597857405edbcbe1ce93d1c714caa | ELSA-2021-9212 | |
kernel-abi-whitelists-2.6.32-696.30.1.el6.noarch.rpm | fb8abf927c8a65e8f7d73ccce0b0abb5 | ELSA-2021-9212 | |
kernel-debug-2.6.32-696.30.1.el6.x86_64.rpm | 5f539c998c964fa12ffab4799ec15d03 | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-696.30.1.el6.i686.rpm | b97d2821fe05de0e62c5c866b59cb8d4 | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-696.30.1.el6.x86_64.rpm | ac82fc4935dd6da4074e463f5fe7c608 | ELSA-2021-9212 | |
kernel-devel-2.6.32-696.30.1.el6.x86_64.rpm | 380fbc6ced429f0a8636a7eb2e95ea79 | ELSA-2021-9212 | |
kernel-doc-2.6.32-696.30.1.el6.noarch.rpm | 7637944f0c5ad705acccbdb47d580fc0 | ELSA-2021-9212 | |
kernel-firmware-2.6.32-696.30.1.el6.noarch.rpm | 303d1bb417b6c5ecb38fed21e59c6f42 | ELSA-2021-9212 | |
kernel-headers-2.6.32-696.30.1.el6.x86_64.rpm | ac49338b9ada1108124d0863bc6f2d7f | ELSA-2021-9212 | |
perf-2.6.32-696.30.1.el6.x86_64.rpm | c5eea6d3eb4a16d8fb5b015e58392f96 | ELSA-2021-9212 | |
python-perf-2.6.32-696.30.1.el6.x86_64.rpm | 34920104076733494de5e8f21b4c1052 | ELSA-2021-9212 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team