ELSA-2018-4017

ELSA-2018-4017 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-01-18

Description


[4.1.12-112.14.13]
- Revert 'kernel.spec: Require the new microcode_ctl.' (Brian Maly)

[4.1.12-112.14.12]
- xen-blkback: add pending_req allocation stats (Ankur Arora) [Orabug: 27386890]
- xen-blkback: move indirect req allocation out-of-line (Ankur Arora) [Orabug: 27386890]
- xen-blkback: pull nseg validation out in a function (Ankur Arora) [Orabug: 27386890]
- xen-blkback: make struct pending_req less monolithic (Ankur Arora) [Orabug: 27386890]
- x86: Clean up IBRS functionality resident in common code (Kanth Ghatraju) [Orabug: 27403317]
- x86: Display correct settings for the SPECTRE_V2 bug (Kanth Ghatraju) [Orabug: 27403317]
- Set CONFIG_GENERIC_CPU_VULNERABILITIES flag (Kanth Ghatraju) [Orabug: 27403317]
- x86/cpu: Implement CPU vulnerabilites sysfs functions (Thomas Gleixner) [Orabug: 27403317]
- sysfs/cpu: Fix typos in vulnerability documentation (David Woodhouse) [Orabug: 27403317]
- sysfs/cpu: Add vulnerability folder (Thomas Gleixner) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (David Woodhouse) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27403317]
- KVM: x86: Add memory barrier on vmcs field lookup (Andrew Honig) {CVE-2017-5753}
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (Andrew Honig) [Orabug: 27402301] {CVE-2017-1000407} {CVE-2017-1000407}
- xfs: give all workqueues rescuer threads (Chris Mason) [Orabug: 27397568]
- ixgbevf: handle mbox_api_13 in ixgbevf_change_mtu (Joao Martins) [Orabug: 27397001]


Related CVEs


CVE-2017-1000407

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-112.14.13.el6uek.src.rpm632e31a509d605c0587285c388a2492149e5b113dad54c66d960b330b793feb8ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-112.14.13.el6uek.x86_64.rpmc50db5637bcec7c11dfbc50ec0326f7c02a3b29c3ecad049174f9ac3163cc8a9ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-112.14.13.el6uek.x86_64.rpm39d953578064fe8295cd8f6a1eff7d7325c974beedf419209074b89aefcc912fELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-112.14.13.el6uek.x86_64.rpm2548b0b789fafcba7354f248a1e8e43ebea9296969c937657fbb32ed394dc648ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-112.14.13.el6uek.x86_64.rpm39d7f8f2584bcc4b92e2c0a15393b871eafc5e7c0615e0d57e6bd5e86309f994ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-112.14.13.el6uek.noarch.rpm5d9aeb9ea224b790af65d0b9ae6d893f66428259c9092bbc55b4315512704576ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-112.14.13.el6uek.noarch.rpmd26f629a9a702bed8f8299e94159387ca13184bc633976d14407435ce6da734eELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-112.14.13.el7uek.src.rpm6a14bebb2338f467662c51ef74d46e2234cc2e206cf63df0bc3857001c872debELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-112.14.13.el7uek.x86_64.rpmcaff6d12ff94bf32492bbf44ad91c50f1ba3c016619845479e6007140194ef3cELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-112.14.13.el7uek.x86_64.rpm17ad2b350acbd6d91829b99561285d79b6373416c06de6ca96f573846d8658eaELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-112.14.13.el7uek.x86_64.rpm9e536c79d9eecb90064147957de6bf31c98f65182edc74ebf24e113e66c93de8ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-112.14.13.el7uek.x86_64.rpmb0d2e3fb189de995b4df6fd3e3d9ad51cc4f9fabbf93720024a203889c537112ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-112.14.13.el7uek.noarch.rpm9e5ad9909b9e41681fa7498e81cce5f0ceb3145c19c1bdc1e1a7b41afc4e84caELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-112.14.13.el7uek.noarch.rpm55d82d258ac39416dc1cfc2dfbea9d63359fe3d6702b0fb9ddeb0c9dbf5dd4a9ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete