Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2018-09-13 |
kernel-uek
[3.8.13-118.24.2]
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (Vlastimil Babka) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (Vlastimil Babka) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Extend 64bit swap file size limit (Vlastimil Babka) [Orabug: 28505476] {CVE-2018-3620}
- mm, fremap: mitigate L1TF in remap_file_pages (Daniel Jordan) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation: Don't mark cpu_no_l1tf __initconst (Boris Ostrovsky) [Orabug: 28505476] {CVE-2018-3620}
- x86/mm/kmmio: Make the tracer robust against L1TF (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/mm/pat: Make set_memory_np() L1TF safe (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/mm/pat: Ensure cpa->pfn only contains page frame numbers (Matt Fleming) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (Sean Christopherson) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Invert all not present mappings (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/bugs: Move the l1tf function and define pr_fmt properly (Konrad Rzeszutek Wilk) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Limit swap file size to MAX_PA/2 (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- mm/pagewalk.c: prevent positive return value of walk_page_test() from being passed to callers (Naoya Horiguchi) [Orabug: 28505476] {CVE-2018-3620}
- pagewalk: improve vma handling (Naoya Horiguchi) [Orabug: 28505476] {CVE-2018-3620}
- mm/pagewalk: remove pgd_entry() and pud_entry() (Naoya Horiguchi) [Orabug: 28505476] {CVE-2018-3620}
- mm/pagewalk.c: fix walk_page_range() access of wrong PTEs (Chen LinX) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Add sysfs reporting for l1tf (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/cpu/intel: Add Knights Mill to Intel family (Piotr Luc) [Orabug: 28505476] {CVE-2018-3620}
- x86/bugs: Concentrate bug reporting into a separate function (Konrad Rzeszutek Wilk) [Orabug: 28505476] {CVE-2018-3620}
- x86/bugs: Concentrate bug detection into a separate function (Konrad Rzeszutek Wilk) [Orabug: 28505476] {CVE-2018-3620}
- x86/cpufeature: Add X86_FEATURE_IA32_ARCH_CAPS and X86_FEATURE_IBRS_ATT (Konrad Rzeszutek Wilk) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Make sure the first page is always reserved (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (Michal Hocko) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Protect swap entries against L1TF (Linus Torvalds) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Change order of offset/type in swap entry (Linus Torvalds) [Orabug: 28505476] {CVE-2018-3620}
- x86/mm: Fix swap entry comment and macro (Dave Hansen) [Orabug: 28505476] {CVE-2018-3620}
- x86/mm: Move swap offset/type up in PTE to work around erratum (Dave Hansen) [Orabug: 28505476] {CVE-2018-3620}
- mm: x86 pgtable: drop unneeded preprocessor ifdef (Cyrill Gorcunov) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT (Andi Kleen) [Orabug: 28505476] {CVE-2018-3620}
- x86/mm: Fix regression with huge pages on PAE (Kirill A. Shutemov) [Orabug: 28505476] {CVE-2018-3620}
- x86/asm: Fix pud/pmd interfaces to handle large PAT bit (Toshi Kani) [Orabug: 28505476] {CVE-2018-3620}
- x86/asm: Add pud/pmd mask interfaces to handle large PAT bit (Toshi Kani) [Orabug: 28505476] {CVE-2018-3620}
- x86/asm: Move PUD_PAGE macros to page_types.h (Toshi Kani) [Orabug: 28505476] {CVE-2018-3620}
- x86/speculation: sort X86_BUG_* with X86_FEATURE_* (Daniel Jordan) [Orabug: 28505476] {CVE-2018-3620}
- Disable kaiser if the cpu is not vulnerable to X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27958074]
- x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown (David Woodhouse) [Orabug: 27958074]
- x86/msr: Add definitions for IA32_ARCH_CAPABILITIES MSR (Kanth Ghatraju) [Orabug: 27958074]
- x86/cpufeatures: Add Intel feature bit for IA32_ARCH_CAPABILITIES supported (Kanth Ghatraju) [Orabug: 27958074]
CVE-2018-3620 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 6 (x86_64) | dtrace-modules-3.8.13-118.24.2.el6uek-0.4.5-3.el6.src.rpm | f3ec60009f039f3584368028842a36bf9496926f503f8e91c44950a135566a33 | - | ol6_x86_64_UEKR3_latest |
kernel-uek-3.8.13-118.24.2.el6uek.src.rpm | 38651a55a1b20d75eaf8aeb4796dcdfa6c64a701d77a5e561b6cf5fdaac98291 | ELSA-2025-20007 | ol6_x86_64_UEKR3_latest | |
dtrace-modules-3.8.13-118.24.2.el6uek-0.4.5-3.el6.x86_64.rpm | fe4a5347ab8bb0bf26dcf34c7b187050dc342150eed781100067b9e8cf48c824 | - | ol6_x86_64_UEKR3_latest | |
kernel-uek-3.8.13-118.24.2.el6uek.x86_64.rpm | 35793a628b7fc90b73c6a004c0bcadd85b9310e43e572bc5034f335ae8a2a93a | ELSA-2025-20007 | ol6_x86_64_UEKR3_latest | |
kernel-uek-debug-3.8.13-118.24.2.el6uek.x86_64.rpm | 439cb4f4231d6edcc78069456df7df6ed66c177b93460b1b9a498d371e8fb267 | ELSA-2025-20007 | ol6_x86_64_UEKR3_latest | |
kernel-uek-debug-devel-3.8.13-118.24.2.el6uek.x86_64.rpm | b487338b38401c5b00950ac5d687aad2ae84de586f6503f5a2c84525c0cac83b | ELSA-2025-20007 | ol6_x86_64_UEKR3_latest | |
kernel-uek-devel-3.8.13-118.24.2.el6uek.x86_64.rpm | a43558d4427956a09d75b626985d8b1fdcd5e0dbaa47e5bfd173e57dea36611f | ELSA-2025-20007 | ol6_x86_64_UEKR3_latest | |
kernel-uek-doc-3.8.13-118.24.2.el6uek.noarch.rpm | 877213f4c7f55db01496f879a21e5de3528f601f5228f0999c23d456cc18d9cb | ELSA-2025-20007 | ol6_x86_64_UEKR3_latest | |
kernel-uek-firmware-3.8.13-118.24.2.el6uek.noarch.rpm | 9f407bbed9ed134c5898ef92c022d8e1a1bd07613ed426d5a4fb67cb13151642 | ELSA-2025-20007 | ol6_x86_64_UEKR3_latest | |
Oracle Linux 7 (x86_64) | dtrace-modules-3.8.13-118.24.2.el7uek-0.4.5-3.el7.src.rpm | 9a229d73aa24e6403918413f612f4b118885300e8e7225786ffc0fca034d1424 | - | ol7_x86_64_UEKR3 |
kernel-uek-3.8.13-118.24.2.el7uek.src.rpm | b39b6f478bd64f391531a17f5fa3fd241f166c0b2fffb99909841f6421739c59 | ELSA-2025-20190 | ol7_x86_64_UEKR3 | |
dtrace-modules-3.8.13-118.24.2.el7uek-0.4.5-3.el7.x86_64.rpm | f4c040a531465e2f9d633ac4bf0f317ae87a2388110c4753136384cfe6c3179f | - | ol7_x86_64_UEKR3 | |
kernel-uek-3.8.13-118.24.2.el7uek.x86_64.rpm | d13f406542a4aa37ebacc9bb43e62b722a51b0099241f19dfb5289fa6059175b | ELSA-2025-20190 | ol7_x86_64_UEKR3 | |
kernel-uek-debug-3.8.13-118.24.2.el7uek.x86_64.rpm | 4ce0888f54ae3ab2033a70bb78ebb47debcdc65a002d18b61fc1f3280140d855 | ELSA-2025-20190 | ol7_x86_64_UEKR3 | |
kernel-uek-debug-devel-3.8.13-118.24.2.el7uek.x86_64.rpm | e8b02737caf787d14f5918f06155e4aac21feff9d9701c4f6bb7f7f2c5e45287 | ELSA-2025-20190 | ol7_x86_64_UEKR3 | |
kernel-uek-devel-3.8.13-118.24.2.el7uek.x86_64.rpm | 996abbdc04e90e3aaf77b430e6b6baa63a4837bf0e0d3ad46e68f6a302e75d06 | ELSA-2025-20190 | ol7_x86_64_UEKR3 | |
kernel-uek-doc-3.8.13-118.24.2.el7uek.noarch.rpm | e5bb6cecf28dc67d748568cdade653e9cefad0acf13f2bed219e537d130b25d0 | ELSA-2025-20190 | ol7_x86_64_UEKR3 | |
kernel-uek-firmware-3.8.13-118.24.2.el7uek.noarch.rpm | c65a042edf134145be7f239d73770b96a2bf7ce3fc4e20d1abd88f6e876b2d6a | ELSA-2025-20007 | ol7_x86_64_UEKR3 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team