ELSA-2018-4210

ELSA-2018-4210 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-09-06

Description


[4.1.12-124.19.1]
- x86/entry/64: Ensure %ebx handling correct in xen_failsafe_callback (George Kennedy) [Orabug: 28402927] {CVE-2018-14678}
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (Andi Kleen) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (Vlastimil Babka) [Orabug: 28488808] {CVE-2018-3620}
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (Sean Christopherson) [Orabug: 28488808] {CVE-2018-3620}
- x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled (Guenter Roeck) [Orabug: 28488808] {CVE-2018-3620}
- x86/spectre: Add missing family 6 check to microcode check (Andi Kleen) [Orabug: 28488808] {CVE-2018-3620}
- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (Thomas Gleixner) [Orabug: 28488808] {CVE-2018-3646}
- x86/microcode: Allow late microcode loading with SMT disabled (Josh Poimboeuf) [Orabug: 28488808] {CVE-2018-3620}
- x86/microcode: Do not upload microcode if CPUs are offline (Ashok Raj) [Orabug: 28488808] {CVE-2018-3620}


Related CVEs


CVE-2018-14678

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.19.1.el6uek.src.rpma33363bd49513b32d9c45fa4974cdab94ebe5964da2496727da9c5263125fafcELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.19.1.el6uek.x86_64.rpmb4138094ab7247ccda5593c799869ac832b25c0b6c508e4d6e4c95387cb48dbcELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.19.1.el6uek.x86_64.rpmfa8d3ef8085708b064998a27ae2a8cdf97f18306c37bcde397b0ba321705e19aELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.19.1.el6uek.x86_64.rpm9381d2deb8473397d223d43b491d6a5dabbf21540f3031376299676513b8c94dELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.19.1.el6uek.x86_64.rpm3249651988b4c91b074a18759d91e8cd9da47d61d75a89927037c2d4ae07a5adELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.19.1.el6uek.noarch.rpm29d604c6a08dbac69a995dda411ff89fe145a0ad87cb23b9d5bd6331c3a283ddELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.19.1.el6uek.noarch.rpm94aa33bdc5d54695ad8b89f40229366542c8534413897b0009a5f4e77bf9331fELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.19.1.el7uek.src.rpm1d691474dc0525f6b422bdfe0db13c5073fdedb59a9692d3bd0db6c1d4f410daELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.19.1.el7uek.x86_64.rpmf3a3dadefd416c624ff3374314d88d73a319ee9d2883a2971889ae58504e2884ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.19.1.el7uek.x86_64.rpmb7caf147531a18b90e458b4a69f4c63b792eca07ff08e7a2667ada6a6dfef589ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.19.1.el7uek.x86_64.rpmc6dcaad09343222eab6733b485d12693b631d1cd8af56fedff16f028592c192eELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.19.1.el7uek.x86_64.rpme8d09de26b4ca362126c45f7bd4d294d68bbc72d4e875be3217fc7cd6c9e7a25ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.19.1.el7uek.noarch.rpm481d61344775459147a3da71440965344301b898800d6db8c3b80dac80c351a0ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.19.1.el7uek.noarch.rpmab9ebac49195504fbd98d24ec831f5e8521b9594c198775c4b92e97b66e81eb2ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete