ELSA-2018-4017

ELSA-2018-4017 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2018-01-18

Description


[4.1.12-112.14.13]
- Revert 'kernel.spec: Require the new microcode_ctl.' (Brian Maly)

[4.1.12-112.14.12]
- xen-blkback: add pending_req allocation stats (Ankur Arora) [Orabug: 27386890]
- xen-blkback: move indirect req allocation out-of-line (Ankur Arora) [Orabug: 27386890]
- xen-blkback: pull nseg validation out in a function (Ankur Arora) [Orabug: 27386890]
- xen-blkback: make struct pending_req less monolithic (Ankur Arora) [Orabug: 27386890]
- x86: Clean up IBRS functionality resident in common code (Kanth Ghatraju) [Orabug: 27403317]
- x86: Display correct settings for the SPECTRE_V2 bug (Kanth Ghatraju) [Orabug: 27403317]
- Set CONFIG_GENERIC_CPU_VULNERABILITIES flag (Kanth Ghatraju) [Orabug: 27403317]
- x86/cpu: Implement CPU vulnerabilites sysfs functions (Thomas Gleixner) [Orabug: 27403317]
- sysfs/cpu: Fix typos in vulnerability documentation (David Woodhouse) [Orabug: 27403317]
- sysfs/cpu: Add vulnerability folder (Thomas Gleixner) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (David Woodhouse) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27403317]
- KVM: x86: Add memory barrier on vmcs field lookup (Andrew Honig) {CVE-2017-5753}
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (Andrew Honig) [Orabug: 27402301] {CVE-2017-1000407} {CVE-2017-1000407}
- xfs: give all workqueues rescuer threads (Chris Mason) [Orabug: 27397568]
- ixgbevf: handle mbox_api_13 in ixgbevf_change_mtu (Joao Martins) [Orabug: 27397001]


Related CVEs


CVE-2017-1000407

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-112.14.13.el6uek.src.rpm1fd2763d15aeffb59d1448302232819a-
kernel-uek-4.1.12-112.14.13.el6uek.x86_64.rpm3b948eae28c1061bd34790329cb27e25-
kernel-uek-debug-4.1.12-112.14.13.el6uek.x86_64.rpme798c5d03ac21e19c7df3f2c707d75c0-
kernel-uek-debug-devel-4.1.12-112.14.13.el6uek.x86_64.rpma8e8ba12741ece780fffa4ef45b2df72-
kernel-uek-devel-4.1.12-112.14.13.el6uek.x86_64.rpm594a8cb1d1953eca1e0508aa7ad8394d-
kernel-uek-doc-4.1.12-112.14.13.el6uek.noarch.rpmd5c0c2e307a1727474dc46d2d49fc8e2-
kernel-uek-firmware-4.1.12-112.14.13.el6uek.noarch.rpm0f308b55b9f51984e9b0f9725f34358a-
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-112.14.13.el7uek.src.rpmec5970646292ea1e5b511323c3d95641-
kernel-uek-4.1.12-112.14.13.el7uek.x86_64.rpm09d8349a76c0a571bc4120670e9483eb-
kernel-uek-debug-4.1.12-112.14.13.el7uek.x86_64.rpmcc20d609e807c8c931d0099d15da3ef5-
kernel-uek-debug-devel-4.1.12-112.14.13.el7uek.x86_64.rpmdff1ed3d52abd981fd97d12e62bb2b66-
kernel-uek-devel-4.1.12-112.14.13.el7uek.x86_64.rpmf8d91e45b5b7efaaf39eb3be3a6e9840-
kernel-uek-doc-4.1.12-112.14.13.el7uek.noarch.rpm8188d5b01af80d69e3521af5ff44e16d-
kernel-uek-firmware-4.1.12-112.14.13.el7uek.noarch.rpm0c5c47ae14d2566134c7b0888e778776-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete