ELSA-2019-4629

ELSA-2019-4629 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-05-14

Description


[4.1.12-124.26.12]
- x86/mds: Add empty commit for CVE-2019-11091 (Konrad Rzeszutek Wilk) [Orabug: 29721935] {CVE-2019-11091}
- x86/microcode: Add loader version file in debugfs (Boris Ostrovsky) [Orabug: 29754165]
- x86/microcode: Fix CPU synchronization routine (Borislav Petkov) [Orabug: 29754165]
- x86/microcode: Synchronize late microcode loading (Borislav Petkov) [Orabug: 29754165]

[4.1.12-124.26.11]
- x86/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- cpu/speculation: Add 'mitigations=' cmdline option (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (Konrad Rzeszutek Wilk) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Fix comment (Boris Ostrovsky) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: update mds_mitigation to reflect debugfs configuration (Mihai Carabas) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: fix microcode late loading (Mihai Carabas) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add boot option to enable MDS protection only while in idle (Boris Ostrovsky) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Improve coverage for MDS vulnerability (Boris Ostrovsky) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add SMT warning message (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mds=full,nosmt cmdline option (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- Documentation: Add MDS vulnerability documentation (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- Documentation: Move L1TF to separate directory (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mitigation mode VMWERV (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add debugfs for controlling MDS (Kanth Ghatraju) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add sysfs reporting for MDS (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mitigation control for MDS (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Clear CPU buffers on exit to user (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mds_clear_cpu_buffers() (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Andi Kleen) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add BUG_MSBDS_ONLY (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add basic bug infrastructure for MDS (Andi Kleen) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation: Consolidate CPU whitelists (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/msr-index: Cleanup bit defines (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- Documentation/l1tf: Fix small spelling typo (Salvatore Bonaccorso) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation: Simplify the CPU bug detection logic (Dominik Brodowski) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}


Related CVEs


CVE-2018-12126
CVE-2019-11091
CVE-2018-12127
CVE-2018-12130

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.26.12.el6uek.src.rpm38d0443381b254575d0db8d64ab09499ede0008475347d023330310d619bf587ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.26.12.el6uek.x86_64.rpm913d4cf78f301852f335cdfa5f49cd80a8c2359b18b11e5eea6fdccd5d16b767ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.26.12.el6uek.x86_64.rpmcb82eda96d6f697744f30c81b617658dafca0c872108af4b0d77eb6d9673d5bbELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.26.12.el6uek.x86_64.rpm46fe068927259eec131e1c6ea64e44fce1fc32ebfc4b2799d271de8b4958f748ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.26.12.el6uek.x86_64.rpm549b1006b287873d51a69bb50e07625a11b973675b1e59b4267821fe5531d52dELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.26.12.el6uek.noarch.rpma44de5414acac2185eee88e3730393db602f6c3d6a9240211a0b3e6d8c1ccc0eELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.26.12.el6uek.noarch.rpm7a8f9096a38bda0c5f5b70d41d08c991cb197424140aa0dfd9c3b82a07a729d6ELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.26.12.el7uek.src.rpm74ae25f967531df37e90d67666061eb4ff37ebcce7b54dfa72f19ef98e6ccb53ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.26.12.el7uek.x86_64.rpmd843aba272517a4d6fb40b4734faa699c4706596b0ec76a6e175d131287d55fdELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.26.12.el7uek.x86_64.rpm22246d9585f672cb071e0b2bdab4df77db4f31f507b03eecb339c6c3c84584c5ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.26.12.el7uek.x86_64.rpm20ecfd5fa09dde3472513fe3c42b3514ea6e05df0b2e014f95414137bc15a099ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.26.12.el7uek.x86_64.rpm3b9bafff8c77572f49c417b0659025c529de36df4fddb0efe5850e1da4ba6232ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.26.12.el7uek.noarch.rpmc02e39d6f62eb9f53da89ccef29e63032f50197207ef4cda3413bc8fc7aca0ecELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.26.12.el7uek.noarch.rpm2f419a65564571c088d8277ce10cce0456c9d1bd7d52256c8ec891a82fd11bd8ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete