Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2018-11-08 |
[4.14.35-1818.4.5]
- x86/intel/spectre_v2: Remove unnecessary retp_compiler() test (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Deprecate spec_store_bypass_disable=userspace (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: x86_spec_ctrl_set needs to be called unconditionally (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: Drop unused DISABLE_IBRS_CLOBBER macro (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Keep SPEC_CTRL_SSBD when IBRS is in use (Boris Ostrovsky) [Orabug: 28814574]
[4.14.35-1818.4.4]
- ocfs2: fix ocfs2 read block panic (Junxiao Bi) [Orabug: 28821391]
- scsi: sg: mitigate read/write abuse (Jann Horn) [Orabug: 28824731] {CVE-2017-13168}
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike Kravetz) [Orabug: 28776542]
- rds: MPRDS messages delivered out of order (Ka-Cheong Poon) [Orabug: 28838051]
- x86/bugs: rework x86_spec_ctrl_set to make its changes explicit (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: rename ssbd_ibrs_selected to ssbd_userspace_selected (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: x86_spec_ctrl_set may not disable IBRS on kernel idle (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: always use x86_spec_ctrl_base or _priv when setting spec ctrl MSR (Daniel Jordan) [Orabug: 28270952]
- iommu: turn on iommu=pt by default (Tushar Dave) [Orabug: 28111039]
- vhost/scsi: Use common handling code in request queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Extract common handling code from control queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Respond to control queue operations (Bijan Mottahedeh) [Orabug: 28775556]
[4.14.35-1818.4.3]
- Fix error code in nfs_lookup_verify_inode() (Lance Shelton) [Orabug: 28807515]
- x86/speculation: Retpoline should always be available on Skylake (Alexandre Chartre) [Orabug: 28801830]
- x86/bugs: ssbd_ibrs_selected called prematurely (Daniel Jordan) [Orabug: 28802799]
- net/mlx4_core: print firmware version during driver loading (Qing Huang) [Orabug: 28809382]
- hugetlbfs: dirty pages as they are added to pagecache (Mike Kravetz) [Orabug: 28813999]
[4.14.35-1818.4.2]
- infiniband: fix a possible use-after-free bug (Cong Wang) [Orabug: 28774511] {CVE-2018-14734}
- nfs: fix a deadlock in nfs client initialization (Scott Mayhew) [Orabug: 28775910]
- x86/speculation: Unconditionally fill RSB on context switch (Alejandro Jimenez) [Orabug: 28631576] {CVE-2018-15572}
- bnxt_re: Implement the shutdown hook of the L2-RoCE driver interface (Somnath Kotur) [Orabug: 28539344]
- rds: RDS (tcp) hangs on sendto() to unresponding address (Ka-Cheong Poon) [Orabug: 28762597]
- uek-rpm: aarch64 some XGENE drivers must be be modules (Tom Saeger) [Orabug: 28769119]
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (Marc Zyngier) [Orabug: 28762424] {CVE-2018-18021}
- arm64: KVM: Tighten guest core register access from userspace (Dave Martin) [Orabug: 28762424] {CVE-2018-18021}
- iommu/amd: Clear memory encryption mask from physical address (Singh, Brijesh) [Orabug: 28770185]
[4.14.35-1818.4.1]
- mm: get rid of vmacache_flush_all() entirely (Linus Torvalds) [Orabug: 28700955] {CVE-2018-17182}
- Btrfs: fix log replay failure after unlink and link combination (Filipe Manana) [Orabug: 27941939]
- x86/speculation: Add sysfs entry to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Allow IBRS firmware to be enabled when IBRS is disabled (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Remove unnecessary retpoline alternatives (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Use static key to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- bnxt_en: Fix memory fault in bnxt_ethtool_init() (Vasundhara Volam) [Orabug: 28632641]
- IB/core: Initialize relaxed_pd properly (Yuval Shaia) [Orabug: 28197305]
[4.14.35-1818.4.0]
- e1000e: Fix link check race condition (Benjamin Poirier) [Orabug: 28489384]
- Revert 'e1000e: Separate signaling for link check/link up' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Avoid missed interrupts following ICR read (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Fix queue interrupt re-raising in Other interrupt (Benjamin Poirier) [Orabug: 28489384]
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Remove Other from EIAC (Benjamin Poirier) [Orabug: 28489384]
- btrfs: validate type when reading a chunk (Gu Jinxiang) [Orabug: 28700851] {CVE-2018-14611}
- btrfs: Check that each block group has corresponding chunk at mount time (Qu Wenruo) [Orabug: 28700872] {CVE-2018-14610}
- net: rds: Use address family to designate IPv4 or IPv6 addresses (Hakon Bugge) [Orabug: 28720069]
- net: rds: Fix blank at eol in af_rds.c (Hakon Bugge) [Orabug: 28720069]
CVE-2017-13168 |
CVE-2018-17182 |
CVE-2018-14734 |
CVE-2018-14610 |
CVE-2018-18021 |
CVE-2018-15572 |
CVE-2018-14611 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (aarch64) | kernel-uek-4.14.35-1818.4.5.el7uek.src.rpm | fbd238f15f12f3276f23671c10d5466e8c948384a479c6a3670b57df1d8f69c3 | ELSA-2025-20190 | ol7_aarch64_latest |
kernel-uek-4.14.35-1818.4.5.el7uek.aarch64.rpm | c99ab82d0127dfda711468c85fd48e566ccf9d4307b78bab70df83ccafa805ac | ELSA-2025-20190 | ol7_aarch64_latest | |
kernel-uek-debug-4.14.35-1818.4.5.el7uek.aarch64.rpm | 19e4687c1bf937f8d0ed0ba3d930c6ed6f8c4664483071f942afa0aaab84d0ff | ELSA-2025-20190 | ol7_aarch64_latest | |
kernel-uek-debug-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm | 12a45cb6619e9918f6fdd9770fc1428aedf658a06095ec7a5b31a3ecef6d3d86 | ELSA-2025-20190 | ol7_aarch64_latest | |
kernel-uek-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm | 13b00e5a8ff31bc0d7b838a3a078da63e399e2838d6ea2993a602805239bcdbd | ELSA-2025-20190 | ol7_aarch64_latest | |
kernel-uek-headers-4.14.35-1818.4.5.el7uek.aarch64.rpm | f669c500869b6ab48b0e5643292f0d4536f51ce371eadc759fbccb04aac73a46 | ELBA-2025-20014 | ol7_aarch64_latest | |
kernel-uek-tools-4.14.35-1818.4.5.el7uek.aarch64.rpm | 415e38274a403f149c37904aad075f13fe7592077ebe867c9a77f7043d37a88c | ELSA-2025-20190 | ol7_aarch64_latest | |
kernel-uek-tools-libs-4.14.35-1818.4.5.el7uek.aarch64.rpm | 6123f1ffd289fcf17ea76fa8296dcb6d7273cc3a973d41cc4b4ca0fc788a234c | ELSA-2025-20019 | ol7_aarch64_latest | |
kernel-uek-tools-libs-devel-4.14.35-1818.4.5.el7uek.aarch64.rpm | 54d04b913c20cd38ad214dc0d91394b929157603ad6ec9233f223f752c859b78 | ELBA-2025-20014 | ol7_aarch64_latest | |
perf-4.14.35-1818.4.5.el7uek.aarch64.rpm | 982390577eab741154ca5d32d7cc3ca5aa8cd5e3bb0b97e21caf7ac8cdaf07f9 | ELSA-2025-20019 | ol7_aarch64_latest | |
python-perf-4.14.35-1818.4.5.el7uek.aarch64.rpm | 4645c9a1870cb3b66c96781ebb37e923b27b2dc308e2197090798f01b4918cb6 | ELSA-2025-20019 | ol7_aarch64_latest | |
Oracle Linux 7 (x86_64) | kernel-uek-4.14.35-1818.4.5.el7uek.src.rpm | fbd238f15f12f3276f23671c10d5466e8c948384a479c6a3670b57df1d8f69c3 | ELSA-2025-20190 | ol7_x86_64_UEKR5_archive |
kernel-uek-4.14.35-1818.4.5.el7uek.x86_64.rpm | b538c9acadd027283f2101e4d37727ab57270cf1f65c132fa0bbd6213e143b3f | ELSA-2025-20190 | ol7_x86_64_UEKR5_archive | |
kernel-uek-debug-4.14.35-1818.4.5.el7uek.x86_64.rpm | b2f4edf401065b828d8f821e956d7e42c261d9903d7392abfad9add1b8e22fec | ELSA-2025-20190 | ol7_x86_64_UEKR5_archive | |
kernel-uek-debug-devel-4.14.35-1818.4.5.el7uek.x86_64.rpm | d2eaa43fbecf63be69056d2b97c8ead5321e661b530a1afb58d801107c398e3d | ELSA-2025-20190 | ol7_x86_64_UEKR5_archive | |
kernel-uek-devel-4.14.35-1818.4.5.el7uek.x86_64.rpm | d5b9972415ac5a7b9a6d6b320bc62287b9981e46979efaf3c2300b211c549b84 | ELSA-2025-20190 | ol7_x86_64_UEKR5_archive | |
kernel-uek-doc-4.14.35-1818.4.5.el7uek.noarch.rpm | 10d10eb44b92b593392f55f281be14aa0481de0fd967885faf634679e2659000 | ELSA-2025-20190 | ol7_x86_64_UEKR5_archive | |
kernel-uek-tools-4.14.35-1818.4.5.el7uek.x86_64.rpm | 1b827063dc6461b7fe9281bbab7a1b41e92f5cd97d7bd36b25c283b54c265955 | ELSA-2025-20190 | ol7_x86_64_UEKR5_archive |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team