Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2019-11-14 |
[3.10.0-1062.4.3.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
[3.10.0-1062.4.3]
- [drm] drm/i915/cmdparser: Fix jump whitelist clearing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
[3.10.0-1062.4.2]
- [drm] drm/i915: Lower RM timeout to avoid DSI hard hangs (Dave Airlie) [1756815 1756816] {CVE-2019-0154}
- [drm] drm/i915/gen8+: Add RC6 CTX corruption WA (Dave Airlie) [1756815 1756816] {CVE-2019-0154}
- [drm] drm/i915/cmdparser: Ignore Length operands during command matching (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915/cmdparser: Add support for backward jumps (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915/cmdparser: Use explicit goto for error paths (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Add gen9 BCS cmdparsing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Allow parsing of unsized batches (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Add support for mandatory cmdparsing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Remove Master tables from cmdparser (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Disable Secure Batches for gen6+ (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Rename gen7 cmdparser tables (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [x86] tsx: Add config options to set tsx=on|off|auto (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [documentation] x86/speculation/taa: Add documentation for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] tsx: Add 'auto' option to the tsx= cmdline parameter (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] speculation/taa: Add sysfs reporting for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] speculation/taa: Add mitigation for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] cpu: Add a 'tsx=' cmdline option with TSX disabled by default (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] cpu: Add a helper function x86_read_arch_cap_msr() (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] msr: Add the IA32_TSX_CTRL MSR (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [documentation] documentation: Add ITLB_MULTIHIT documentation (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: mmu: Recovery of shattered NX large pages (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: Add helper function for creating VM worker threads (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [kernel] cpu/speculation: Uninline and export CPU mitigations helpers (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] cpu: Add Tremont to the cpu vulnerability whitelist (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] Add ITLB_MULTIHIT bug infrastructure (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: Do not release the page inside mmu_set_spte() (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: mmu: Remove unused parameter of __direct_map() (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: Convert kvm_lock to a mutex (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: drop vcpu param in gpte_access (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: x86, powerpc: do not allow clearing largepages debugfs entry (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
CVE-2019-0155 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (x86_64) | kernel-3.10.0-1062.4.3.el7.src.rpm | 872d5464f248b89dcf505e240edad6a7 | ELBA-2021-1397-1 |
bpftool-3.10.0-1062.4.3.el7.x86_64.rpm | a7eb7e763c0c3bd27662425dd5ded2a3 | ELBA-2021-1397-1 | |
kernel-3.10.0-1062.4.3.el7.x86_64.rpm | 4324942c0d22fdc471a8fb4c4d3dc0c9 | ELBA-2021-1397-1 | |
kernel-abi-whitelists-3.10.0-1062.4.3.el7.noarch.rpm | 0fe3cf93bfa1579f659ab1e74bb4c11c | ELBA-2021-1397-1 | |
kernel-debug-3.10.0-1062.4.3.el7.x86_64.rpm | 20bf2ccf3dfce5e32e63a2023a4bc5a2 | ELBA-2021-1397-1 | |
kernel-debug-devel-3.10.0-1062.4.3.el7.x86_64.rpm | 672e58dae459a9e64e294f6268a9532c | ELBA-2021-1397-1 | |
kernel-devel-3.10.0-1062.4.3.el7.x86_64.rpm | 6dc7461a825d6ec9b6ebc9c49fde1844 | ELBA-2021-1397-1 | |
kernel-doc-3.10.0-1062.4.3.el7.noarch.rpm | d582b7de56a6848ce783c16c35448aa1 | ELBA-2021-1397-1 | |
kernel-headers-3.10.0-1062.4.3.el7.x86_64.rpm | 224fb059cf9ea01f8995f0e2d4be068f | ELBA-2021-1397-1 | |
kernel-tools-3.10.0-1062.4.3.el7.x86_64.rpm | 743124b34bcc03f25c9645bf2ccbfe04 | ELBA-2021-1397-1 | |
kernel-tools-libs-3.10.0-1062.4.3.el7.x86_64.rpm | cd98f5e42f1f5be30e3bc79c6cf1e5d1 | ELBA-2021-1397-1 | |
kernel-tools-libs-devel-3.10.0-1062.4.3.el7.x86_64.rpm | eabcdfdc6178247736adfdc9f59bc630 | ELBA-2021-1397-1 | |
perf-3.10.0-1062.4.3.el7.x86_64.rpm | cb957744dce9ccd49239c1e2fc866bbe | ELSA-2021-9220 | |
python-perf-3.10.0-1062.4.3.el7.x86_64.rpm | 351a78218d7a04e58582092b81929bfb | ELSA-2021-9220 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team