Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2019-05-15 |
[3.10.0-957.12.2.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [bug 24817676]
[3.10.0-957.12.2]
- [x86] x86/speculation/mds: Add SMT warning message (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Move arch_smt_update() call to after mitigation decisions (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] x86/speculation/mds: Add mds=full,nosmt cmdline option (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kernel] x86/speculation: Remove redundant arch_smt_update() invocation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Update MDS mitigation status after late microcode load (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add debugfs x86/smt_present file (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Disable automatic enabling of STIBP with SMT on (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Add MDS vulnerability documentation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Move L1TF to separate directory (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation mode VMWERV (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [base] x86/speculation/mds: Add sysfs reporting for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation control for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kvm] x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Clear CPU buffers on exit to user (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mds_clear_cpu_buffers() (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kvm] x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add BUG_MSBDS_ONLY (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add basic bug infrastructure for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Consolidate CPU whitelists (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/msr-index: Cleanup bit defines (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/l1tf: Show actual SMT state (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Simplify sysfs report of VMX L1TF vulnerability (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Rework SMT state change (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kernel] sched/smt: Expose sched_smt_present static key (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kernel] sched/smt: Make sched_smt_present track topology (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Disable STIBP when enhanced IBRS is in use (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spectre_v2: Make spectre_v2_mitigation mode available (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add X86_FEATURE_USE_IBPB (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add casting to fix compilation error (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/cpu: Sanitize FAM6_ATOM naming (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/cpufeatures: Add Intel PCONFIG cpufeature (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
CVE-2018-12127 |
CVE-2018-12126 |
CVE-2018-12130 |
CVE-2019-11091 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (x86_64) | kernel-3.10.0-957.12.2.el7.src.rpm | dcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedf | ELSA-2025-1281 | ol7_x86_64_latest |
kernel-3.10.0-957.12.2.el7.src.rpm | dcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedf | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-3.10.0-957.12.2.el7.src.rpm | dcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedf | ELSA-2025-1281 | ol7_x86_64_optional_archive | |
kernel-3.10.0-957.12.2.el7.src.rpm | dcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedf | ELSA-2025-1281 | ol7_x86_64_optional_latest | |
kernel-3.10.0-957.12.2.el7.src.rpm | dcff8ecdfa41df2403a39a8d7114fca7952f72f76d9125f50d211b277741eedf | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
bpftool-3.10.0-957.12.2.el7.x86_64.rpm | 241b2223630aa3242fbe766329c44c91ce65e725292f74b4472f937a5ac4dc4e | ELSA-2025-1281 | ol7_x86_64_latest | |
bpftool-3.10.0-957.12.2.el7.x86_64.rpm | 241b2223630aa3242fbe766329c44c91ce65e725292f74b4472f937a5ac4dc4e | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
bpftool-3.10.0-957.12.2.el7.x86_64.rpm | 241b2223630aa3242fbe766329c44c91ce65e725292f74b4472f937a5ac4dc4e | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-3.10.0-957.12.2.el7.x86_64.rpm | fa84f7ff22e192adce92c6ce3fef9926fa0ffc40a3782624b938ced8779ce3d3 | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-3.10.0-957.12.2.el7.x86_64.rpm | fa84f7ff22e192adce92c6ce3fef9926fa0ffc40a3782624b938ced8779ce3d3 | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-3.10.0-957.12.2.el7.x86_64.rpm | fa84f7ff22e192adce92c6ce3fef9926fa0ffc40a3782624b938ced8779ce3d3 | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm | cfb9f81196d4d0991c8dcbe12f9dfc4512da1fbd5b628353e8c8786e0c05c244 | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm | cfb9f81196d4d0991c8dcbe12f9dfc4512da1fbd5b628353e8c8786e0c05c244 | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm | cfb9f81196d4d0991c8dcbe12f9dfc4512da1fbd5b628353e8c8786e0c05c244 | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm | 093a00e2a13240a489424efccc5b74b7a610e121ef99c23ef051489564ee6404 | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm | 093a00e2a13240a489424efccc5b74b7a610e121ef99c23ef051489564ee6404 | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm | 093a00e2a13240a489424efccc5b74b7a610e121ef99c23ef051489564ee6404 | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm | 0e53aa0d34b5bf0872a26e21537dd4a3717e7f172b73c63f80bfa99a8132d22b | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm | 0e53aa0d34b5bf0872a26e21537dd4a3717e7f172b73c63f80bfa99a8132d22b | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm | 0e53aa0d34b5bf0872a26e21537dd4a3717e7f172b73c63f80bfa99a8132d22b | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm | 3244654907c66ba790c2f02ee4bc24f6cc061e871003ccd2b96e42ad1f6d332d | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm | 3244654907c66ba790c2f02ee4bc24f6cc061e871003ccd2b96e42ad1f6d332d | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm | 3244654907c66ba790c2f02ee4bc24f6cc061e871003ccd2b96e42ad1f6d332d | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-doc-3.10.0-957.12.2.el7.noarch.rpm | 912794a8f17da71969727c530a88bea616abaff0105ea761c1ea59a366417419 | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-doc-3.10.0-957.12.2.el7.noarch.rpm | 912794a8f17da71969727c530a88bea616abaff0105ea761c1ea59a366417419 | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-doc-3.10.0-957.12.2.el7.noarch.rpm | 912794a8f17da71969727c530a88bea616abaff0105ea761c1ea59a366417419 | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm | 166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7 | ELSA-2025-1281 | exadata_dbserver_19.2.3.0.0_x86_64_base | |
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm | 166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7 | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm | 166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7 | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm | 166aa54a0b01ab4818f5af03367e91ac5fd6de1e9dc239b7107156cc32b3f4a7 | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm | 30083740a9cb05818358fb5915af70420474e66d7da4925ccefbfdeb2af285f6 | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm | 30083740a9cb05818358fb5915af70420474e66d7da4925ccefbfdeb2af285f6 | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm | 30083740a9cb05818358fb5915af70420474e66d7da4925ccefbfdeb2af285f6 | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm | 510069780e2132f5ac1e31bae37753a452b68164cf525db8dfb1820a121f6e0c | ELSA-2025-1281 | ol7_x86_64_latest | |
kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm | 510069780e2132f5ac1e31bae37753a452b68164cf525db8dfb1820a121f6e0c | ELSA-2025-1281 | ol7_x86_64_latest_archive | |
kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm | 510069780e2132f5ac1e31bae37753a452b68164cf525db8dfb1820a121f6e0c | ELSA-2025-1281 | ol7_x86_64_u6_patch | |
kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm | e40717925ef6755c4a33e6f473260d2345ddd4b342706e5cf0cb1ee5a75486b5 | ELSA-2025-1281 | ol7_x86_64_optional_archive | |
kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm | e40717925ef6755c4a33e6f473260d2345ddd4b342706e5cf0cb1ee5a75486b5 | ELSA-2025-1281 | ol7_x86_64_optional_latest | |
perf-3.10.0-957.12.2.el7.x86_64.rpm | 3a0a29b75eb43a749e03b24b0d5e92f99203c34ba4ea9c6b486d2bb3183d2977 | ELSA-2025-20019 | ol7_x86_64_latest | |
perf-3.10.0-957.12.2.el7.x86_64.rpm | 3a0a29b75eb43a749e03b24b0d5e92f99203c34ba4ea9c6b486d2bb3183d2977 | ELSA-2025-20019 | ol7_x86_64_latest_archive | |
perf-3.10.0-957.12.2.el7.x86_64.rpm | 3a0a29b75eb43a749e03b24b0d5e92f99203c34ba4ea9c6b486d2bb3183d2977 | ELSA-2025-20019 | ol7_x86_64_u6_patch | |
python-perf-3.10.0-957.12.2.el7.x86_64.rpm | c661edc98a93c97a5c8b53ff84d1b82dd5cc9f5d838db2347f08dfe3c4762046 | ELSA-2025-20019 | ol7_x86_64_latest | |
python-perf-3.10.0-957.12.2.el7.x86_64.rpm | c661edc98a93c97a5c8b53ff84d1b82dd5cc9f5d838db2347f08dfe3c4762046 | ELSA-2025-20019 | ol7_x86_64_latest_archive | |
python-perf-3.10.0-957.12.2.el7.x86_64.rpm | c661edc98a93c97a5c8b53ff84d1b82dd5cc9f5d838db2347f08dfe3c4762046 | ELSA-2025-20019 | ol7_x86_64_u6_patch |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team