Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-01-18 |
[4.1.12-112.14.13]
- Revert 'kernel.spec: Require the new microcode_ctl.' (Brian Maly)
[4.1.12-112.14.12]
- xen-blkback: add pending_req allocation stats (Ankur Arora) [Orabug: 27386890]
- xen-blkback: move indirect req allocation out-of-line (Ankur Arora) [Orabug: 27386890]
- xen-blkback: pull nseg validation out in a function (Ankur Arora) [Orabug: 27386890]
- xen-blkback: make struct pending_req less monolithic (Ankur Arora) [Orabug: 27386890]
- x86: Clean up IBRS functionality resident in common code (Kanth Ghatraju) [Orabug: 27403317]
- x86: Display correct settings for the SPECTRE_V2 bug (Kanth Ghatraju) [Orabug: 27403317]
- Set CONFIG_GENERIC_CPU_VULNERABILITIES flag (Kanth Ghatraju) [Orabug: 27403317]
- x86/cpu: Implement CPU vulnerabilites sysfs functions (Thomas Gleixner) [Orabug: 27403317]
- sysfs/cpu: Fix typos in vulnerability documentation (David Woodhouse) [Orabug: 27403317]
- sysfs/cpu: Add vulnerability folder (Thomas Gleixner) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (David Woodhouse) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27403317]
- KVM: x86: Add memory barrier on vmcs field lookup (Andrew Honig) {CVE-2017-5753}
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (Andrew Honig) [Orabug: 27402301] {CVE-2017-1000407} {CVE-2017-1000407}
- xfs: give all workqueues rescuer threads (Chris Mason) [Orabug: 27397568]
- ixgbevf: handle mbox_api_13 in ixgbevf_change_mtu (Joao Martins) [Orabug: 27397001]
CVE-2017-1000407 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-112.14.13.el6uek.src.rpm | 1fd2763d15aeffb59d1448302232819a | ELSA-2021-9215 |
kernel-uek-4.1.12-112.14.13.el6uek.x86_64.rpm | 3b948eae28c1061bd34790329cb27e25 | ELSA-2021-9215 | |
kernel-uek-debug-4.1.12-112.14.13.el6uek.x86_64.rpm | e798c5d03ac21e19c7df3f2c707d75c0 | ELSA-2021-9215 | |
kernel-uek-debug-devel-4.1.12-112.14.13.el6uek.x86_64.rpm | a8e8ba12741ece780fffa4ef45b2df72 | ELSA-2021-9215 | |
kernel-uek-devel-4.1.12-112.14.13.el6uek.x86_64.rpm | 594a8cb1d1953eca1e0508aa7ad8394d | ELSA-2021-9215 | |
kernel-uek-doc-4.1.12-112.14.13.el6uek.noarch.rpm | d5c0c2e307a1727474dc46d2d49fc8e2 | ELSA-2021-9215 | |
kernel-uek-firmware-4.1.12-112.14.13.el6uek.noarch.rpm | 0f308b55b9f51984e9b0f9725f34358a | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | kernel-uek-4.1.12-112.14.13.el7uek.src.rpm | ec5970646292ea1e5b511323c3d95641 | ELSA-2021-9220 |
kernel-uek-4.1.12-112.14.13.el7uek.x86_64.rpm | 09d8349a76c0a571bc4120670e9483eb | ELSA-2021-9220 | |
kernel-uek-debug-4.1.12-112.14.13.el7uek.x86_64.rpm | cc20d609e807c8c931d0099d15da3ef5 | ELSA-2021-9220 | |
kernel-uek-debug-devel-4.1.12-112.14.13.el7uek.x86_64.rpm | dff1ed3d52abd981fd97d12e62bb2b66 | ELSA-2021-9220 | |
kernel-uek-devel-4.1.12-112.14.13.el7uek.x86_64.rpm | f8d91e45b5b7efaaf39eb3be3a6e9840 | ELSA-2021-9220 | |
kernel-uek-doc-4.1.12-112.14.13.el7uek.noarch.rpm | 8188d5b01af80d69e3521af5ff44e16d | ELSA-2021-9220 | |
kernel-uek-firmware-4.1.12-112.14.13.el7uek.noarch.rpm | 0c5c47ae14d2566134c7b0888e778776 | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team