ELSA-2019-1168

ELSA-2019-1168 - kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-05-15

Description


[3.10.0-957.12.2.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [bug 24817676]

[3.10.0-957.12.2]
- [x86] x86/speculation/mds: Add SMT warning message (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Move arch_smt_update() call to after mitigation decisions (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] x86/speculation/mds: Add mds=full,nosmt cmdline option (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kernel] x86/speculation: Remove redundant arch_smt_update() invocation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Update MDS mitigation status after late microcode load (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add debugfs x86/smt_present file (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Disable automatic enabling of STIBP with SMT on (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Add MDS vulnerability documentation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Move L1TF to separate directory (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation mode VMWERV (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [base] x86/speculation/mds: Add sysfs reporting for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation control for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kvm] x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Clear CPU buffers on exit to user (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mds_clear_cpu_buffers() (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kvm] x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add BUG_MSBDS_ONLY (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add basic bug infrastructure for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Consolidate CPU whitelists (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/msr-index: Cleanup bit defines (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/l1tf: Show actual SMT state (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Simplify sysfs report of VMX L1TF vulnerability (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Rework SMT state change (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kernel] sched/smt: Expose sched_smt_present static key (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kernel] sched/smt: Make sched_smt_present track topology (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Disable STIBP when enhanced IBRS is in use (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spectre_v2: Make spectre_v2_mitigation mode available (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add X86_FEATURE_USE_IBPB (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add casting to fix compilation error (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/cpu: Sanitize FAM6_ATOM naming (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/cpufeatures: Add Intel PCONFIG cpufeature (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}


Related CVEs


CVE-2018-12127
CVE-2018-12126
CVE-2018-12130
CVE-2019-11091

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-3.10.0-957.12.2.el7.src.rpmdcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedfELSA-2025-1281ol7_x86_64_latest
kernel-3.10.0-957.12.2.el7.src.rpmdcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedfELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-957.12.2.el7.src.rpmdcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedfELSA-2025-1281ol7_x86_64_optional_archive
kernel-3.10.0-957.12.2.el7.src.rpmdcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedfELSA-2025-1281ol7_x86_64_optional_latest
kernel-3.10.0-957.12.2.el7.src.rpmdcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedfELSA-2025-1281ol7_x86_64_u6_patch
bpftool-3.10.0-957.12.2.el7.x86_64.rpm241b2223630aa3242fbe766329c44c91ce65e725292f74b4472f937a5ac4dc4eELSA-2025-1281ol7_x86_64_latest
bpftool-3.10.0-957.12.2.el7.x86_64.rpm241b2223630aa3242fbe766329c44c91ce65e725292f74b4472f937a5ac4dc4eELSA-2025-1281ol7_x86_64_latest_archive
bpftool-3.10.0-957.12.2.el7.x86_64.rpm241b2223630aa3242fbe766329c44c91ce65e725292f74b4472f937a5ac4dc4eELSA-2025-1281ol7_x86_64_u6_patch
kernel-3.10.0-957.12.2.el7.x86_64.rpmfa84f7ff22e192adce92c6ce3fef9926fa0ffc40a3782624b938ced8779ce3d3ELSA-2025-1281ol7_x86_64_latest
kernel-3.10.0-957.12.2.el7.x86_64.rpmfa84f7ff22e192adce92c6ce3fef9926fa0ffc40a3782624b938ced8779ce3d3ELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-957.12.2.el7.x86_64.rpmfa84f7ff22e192adce92c6ce3fef9926fa0ffc40a3782624b938ced8779ce3d3ELSA-2025-1281ol7_x86_64_u6_patch
kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpmcfb9f81196d4d0991c8dcbe12f9dfc4512da1fbd5b628353e8c8786e0c05c244ELSA-2025-1281ol7_x86_64_latest
kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpmcfb9f81196d4d0991c8dcbe12f9dfc4512da1fbd5b628353e8c8786e0c05c244ELSA-2025-1281ol7_x86_64_latest_archive
kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpmcfb9f81196d4d0991c8dcbe12f9dfc4512da1fbd5b628353e8c8786e0c05c244ELSA-2025-1281ol7_x86_64_u6_patch
kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm093a00e2a13240a489424efccc5b74b7a610e121ef99c23ef051489564ee6404ELSA-2025-1281ol7_x86_64_latest
kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm093a00e2a13240a489424efccc5b74b7a610e121ef99c23ef051489564ee6404ELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm093a00e2a13240a489424efccc5b74b7a610e121ef99c23ef051489564ee6404ELSA-2025-1281ol7_x86_64_u6_patch
kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm0e53aa0d34b5bf0872a26e21537dd4a3717e7f172b73c63f80bfa99a8132d22bELSA-2025-1281ol7_x86_64_latest
kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm0e53aa0d34b5bf0872a26e21537dd4a3717e7f172b73c63f80bfa99a8132d22bELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm0e53aa0d34b5bf0872a26e21537dd4a3717e7f172b73c63f80bfa99a8132d22bELSA-2025-1281ol7_x86_64_u6_patch
kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm3244654907c66ba790c2f02ee4bc24f6cc061e871003ccd2b96e42ad1f6d332dELSA-2025-1281ol7_x86_64_latest
kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm3244654907c66ba790c2f02ee4bc24f6cc061e871003ccd2b96e42ad1f6d332dELSA-2025-1281ol7_x86_64_latest_archive
kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm3244654907c66ba790c2f02ee4bc24f6cc061e871003ccd2b96e42ad1f6d332dELSA-2025-1281ol7_x86_64_u6_patch
kernel-doc-3.10.0-957.12.2.el7.noarch.rpm912794a8f17da71969727c530a88bea616abaff0105ea761c1ea59a366417419ELSA-2025-1281ol7_x86_64_latest
kernel-doc-3.10.0-957.12.2.el7.noarch.rpm912794a8f17da71969727c530a88bea616abaff0105ea761c1ea59a366417419ELSA-2025-1281ol7_x86_64_latest_archive
kernel-doc-3.10.0-957.12.2.el7.noarch.rpm912794a8f17da71969727c530a88bea616abaff0105ea761c1ea59a366417419ELSA-2025-1281ol7_x86_64_u6_patch
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7ELSA-2025-1281exadata_dbserver_19.2.3.0.0_x86_64_base
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7ELSA-2025-1281ol7_x86_64_latest
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7ELSA-2025-1281ol7_x86_64_latest_archive
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7ELSA-2025-1281ol7_x86_64_u6_patch
kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm30083740a9cb05818358fb5915af70420474e66d7da4925ccefbfdeb2af285f6ELSA-2025-1281ol7_x86_64_latest
kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm30083740a9cb05818358fb5915af70420474e66d7da4925ccefbfdeb2af285f6ELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm30083740a9cb05818358fb5915af70420474e66d7da4925ccefbfdeb2af285f6ELSA-2025-1281ol7_x86_64_u6_patch
kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm510069780e2132f5ac1e31bae37753a452b68164cf525db8dfb1820a121f6e0cELSA-2025-1281ol7_x86_64_latest
kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm510069780e2132f5ac1e31bae37753a452b68164cf525db8dfb1820a121f6e0cELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm510069780e2132f5ac1e31bae37753a452b68164cf525db8dfb1820a121f6e0cELSA-2025-1281ol7_x86_64_u6_patch
kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpme40717925ef6755c4a33e6f473260d2345ddd4b342706e5cf0cb1ee5a75486b5ELSA-2025-1281ol7_x86_64_optional_archive
kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpme40717925ef6755c4a33e6f473260d2345ddd4b342706e5cf0cb1ee5a75486b5ELSA-2025-1281ol7_x86_64_optional_latest
perf-3.10.0-957.12.2.el7.x86_64.rpm3a0a29b75eb43a749e03b24b0d5e92f99203c34ba4ea9c6b486d2bb3183d2977ELSA-2025-20019ol7_x86_64_latest
perf-3.10.0-957.12.2.el7.x86_64.rpm3a0a29b75eb43a749e03b24b0d5e92f99203c34ba4ea9c6b486d2bb3183d2977ELSA-2025-20019ol7_x86_64_latest_archive
perf-3.10.0-957.12.2.el7.x86_64.rpm3a0a29b75eb43a749e03b24b0d5e92f99203c34ba4ea9c6b486d2bb3183d2977ELSA-2025-20019ol7_x86_64_u6_patch
python-perf-3.10.0-957.12.2.el7.x86_64.rpmc661edc98a93c97a5c8b53ff84d1b82dd5cc9f5d838db2347f08dfe3c4762046ELSA-2025-20019ol7_x86_64_latest
python-perf-3.10.0-957.12.2.el7.x86_64.rpmc661edc98a93c97a5c8b53ff84d1b82dd5cc9f5d838db2347f08dfe3c4762046ELSA-2025-20019ol7_x86_64_latest_archive
python-perf-3.10.0-957.12.2.el7.x86_64.rpmc661edc98a93c97a5c8b53ff84d1b82dd5cc9f5d838db2347f08dfe3c4762046ELSA-2025-20019ol7_x86_64_u6_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete