Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2019-08-04 |
kernel
- 2.6.18-419.0.0.0.14
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Call VERW on NMI path when returning to user (Patrick Colp) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Fix verw usage to use memory operand (Patrick Colp) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Make cpu_matches() __cpuinit (Patrick Colp) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add mitigation mode VMWERV (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add sysfs reporting for MDS (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add mitigation control for MDS (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Improve coverage for MDS vulnerability (Boris Ostrovsky) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Clear CPU buffers on exit to user (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add mds_clear_cpu_buffers() (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add BUG_MSBDS_ONLY (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add basic bug infrastructure for MDS (Andi Kleen) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Consolidate CPU whitelists (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- 2.6.18-419.0.0.0.12
- [x86] mm/dump_pagetables: Add a check_l1tf debugfs file (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] cpu: Make flush_l1d visible in /proc/cpuinfo (Chris von Recklinghausen) [1593378]
- [x86] cpufeatures: Add detection of L1D cache flush support. (Chris von Recklinghausen) [1593378]
- [x86] l1tf: protect _PAGE_FILE PTEs against speculation (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Extend 64bit swap file size limit (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] bugs: Move the l1tf function and define pr_fmt properly (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Limit swap file size to MAX_PA/2 (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Add sysfs reporting for l1tf (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Protect PROT_NONE PTEs against speculation (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Protect swap entries against L1TF (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Change order of offset/type in swap entry (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] cpu: Fix incorrect vulnerabilities files function prototypes (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] bugs: Export the internal __cpu_bugs variable (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] spec_ctrl: sync with upstream cpu_set_bug_bits() (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] intel-family.h: Add GEMINI_LAKE SOC (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] mm: Fix swap entry comment and macro (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] mm: Move swap offset/type up in PTE to work around erratum (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] cpufeatures: Resolve X86_FEATURE_SMEP definition conflict (Radomir Vrbovsky) [1570474]
- [x86] fix kexec load warnings with PTI enabled (Rafael Aquini) [1576191]
- [x86] ia32entry: make target ia32_ret_from_sys_call the common exit point to long-mode (Rafael Aquini) [1570474] {CVE-2009-2910}
- [x86] spec_ctrl: only perform RSB stuffing on SMEP capable CPUs (Rafael Aquini) [1570474] {CVE-2009-2910}
- [net] tcp: fix 0 divide in __tcp_select_window (Davide Caratti) [1488343] {CVE-2017-14106}
- [net] tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0 (Davide Caratti) [1488343] {CVE-2017-14106}
- [x86] adjust / fix LDT handling for PTI (Rafael Aquini) [1584622]
- [x86] Fix up /proc/cpuinfo entries (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [kernel] spec_ctrl: work around broken microcode (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] Only expose PR_{GET, SET}_SPECULATION_CTRL if CONFIG_SPEC_CTRL is defined (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] misc changes to fix i386 builds (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] amd: Disable AMD SSBD mitigation in a VM (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Rename _RDS to _SSBD (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] process: Allow runtime control of Speculative Store Bypass (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] 64: add skeletonized version of __switch_to_xtra (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [kernel] prctl: Add speculation control prctls (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requested (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] spec_ctrl: Sync up RDS setting with IBRS code (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Expose the /sys/../spec_store_bypass and X86_BUG_SPEC_STORE_BYPASS (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] include: add latest intel-family.h from RHEL6 (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpuid: Fix up IBRS/IBPB/STIBP feature bits on Intel (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpufeatures: Clean up Spectre v2 related CPUID flags (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpufeatures: Add AMD feature bits for Speculation Control (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpufeatures: Add Intel feature bits for Speculation (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpu: Add driver auto probing for x86 features (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- 2.6.18-419.0.0.0.11
- x86_64/entry: Don't use IST entry for #BP stack [orabug 28452062] {CVE-2018-8897}
- 2.6.18-419.0.0.0.10
- Backport CVE-2017-5715 to RHCK/OL5 [orabug 27787723]
- 2.6.18-419.0.0.0.9
- rebuild with retpoline compiler
- 2.6.18-419.0.0.0.8
- Backport CVEs to RHCK/OL5 [orabug 27547712] {CVE-2017-5753} {CVE-2017-5754}
- 2.6.18-419.0.0.0.5
- [fs] fix kernel panic on boot on ia64 guests (Honglei Wang) [orabug 26934100]
- 2.6.18-419.0.0.0.4
- [fs] fix bug in loading of PIE binaries (Michael Davidson) [orabug 26916951] {CVE-2017-1000253}
- 2.6.18-419.0.0.0.3
- nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) [orabug 26586706] {CVE-2017-7895}
CVE-2018-12127 |
CVE-2019-11091 |
CVE-2018-12126 |
CVE-2018-12130 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 5 (i386) | kernel-2.6.18-419.0.0.0.14.el5.src.rpm | 5f3a9ce03928df0604ea1df068a4b9349e3769e693563b7129cdc72950dd8c3c | - | ol5_i386_ELS |
ocfs2-2.6.18-419.0.0.0.14.el5-1.4.11-1.el5.src.rpm | b6ada598a12d38e985c92aa47d24f3df21f76f07f27fbd9d2cf0f092774d56db | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5-2.0.5-2.el5.src.rpm | a1b345a10c1344559e33ffe60a8c29cdb7b9d0638a4034e5ced34a67f2c3f22f | - | ol5_i386_ELS | |
kernel-2.6.18-419.0.0.0.14.el5.i686.rpm | 628d10d5ee1beef316d59891eb34402ec76833136b991157e79521a4d605255a | - | ol5_i386_ELS | |
kernel-PAE-2.6.18-419.0.0.0.14.el5.i686.rpm | c865b7c547a83516df73b4b7f6e01921f90a63c2155049ef16c4136405df96a3 | - | ol5_i386_ELS | |
kernel-PAE-devel-2.6.18-419.0.0.0.14.el5.i686.rpm | dab6353654ea2b6e1ca1479b08655e1405947cfddfc96930ed534163f05837d9 | - | ol5_i386_ELS | |
kernel-debug-2.6.18-419.0.0.0.14.el5.i686.rpm | f7a5a200e7c006454b2e8649f5d5bc6e0cbc676234187d558af867ddc6dbdb9e | - | ol5_i386_ELS | |
kernel-debug-devel-2.6.18-419.0.0.0.14.el5.i686.rpm | 7a1f8de8707843eaba593f97194c49218ec672060911bfbab43f9719b130c2f0 | - | ol5_i386_ELS | |
kernel-devel-2.6.18-419.0.0.0.14.el5.i686.rpm | 66d1291cd25f0328ea8ad8a42a685ee1c94739a99ab0c5d58f9cb4b79c5d4274 | - | ol5_i386_ELS | |
kernel-doc-2.6.18-419.0.0.0.14.el5.noarch.rpm | a87c01f1171c1a555781e3a74f68696d1c594d9d080147fe0fbae04713b86dcb | - | ol5_i386_ELS | |
kernel-headers-2.6.18-419.0.0.0.14.el5.i386.rpm | dce65488c4b85312aeb19c372f094c1fdb812b3b8412538c391f31f03cb6c502 | - | ol5_i386_ELS | |
kernel-xen-2.6.18-419.0.0.0.14.el5.i686.rpm | fc3263fc95e90d31fb4dafb5c76bb35802d999af8cad2585a7296de6c2fd8eb1 | - | ol5_i386_ELS | |
kernel-xen-devel-2.6.18-419.0.0.0.14.el5.i686.rpm | 5002ff17f695f61bcba18dc67c28df46b7aad8b49d97ff238adc898813816347 | - | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5-1.4.11-1.el5.i686.rpm | 48602ff1efd0803b20b1f0805d6987bad80a68006eabc74049a287d999376d9e | - | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5PAE-1.4.11-1.el5.i686.rpm | 01828af232880ce61cf137f315543f465b3285258b43d8f3d7beb395f422d9dd | - | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5debug-1.4.11-1.el5.i686.rpm | a7622e0351efe29a48f0b33c28d3edc9ff97171910a59f00db72d7a92cad7af1 | - | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5xen-1.4.11-1.el5.i686.rpm | 1f1b94b693b33e016582b9e8bc9200725d19aeb26210c110c910f5cc42c9526a | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5-2.0.5-2.el5.i686.rpm | 5eab8b1601599230cb998ac70541d974de80618bc06d02dd42bbc5fb7d9e253e | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5PAE-2.0.5-2.el5.i686.rpm | c057bc47c98b193bd8b088e959e83f8bb55a9c1525d13d91ea270ccbb36febb9 | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5debug-2.0.5-2.el5.i686.rpm | a2b7d2002575e6ed8053ad7333c5a285feaf2507d88f063d4a4627c376fc21dc | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5xen-2.0.5-2.el5.i686.rpm | 1d5aeb212fd1e5117d32ad8bb2248810338bb3e1366290970336c4be0632f6cf | - | ol5_i386_ELS | |
Oracle Linux 5 (ia64) | kernel-2.6.18-419.0.0.0.14.el5.src.rpm | 5f3a9ce03928df0604ea1df068a4b9349e3769e693563b7129cdc72950dd8c3c | - | ol5_ia64_ELS |
ocfs2-2.6.18-419.0.0.0.14.el5-1.4.11-1.el5.src.rpm | b6ada598a12d38e985c92aa47d24f3df21f76f07f27fbd9d2cf0f092774d56db | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5-2.0.5-2.el5.src.rpm | a1b345a10c1344559e33ffe60a8c29cdb7b9d0638a4034e5ced34a67f2c3f22f | - | ol5_ia64_ELS | |
kernel-2.6.18-419.0.0.0.14.el5.ia64.rpm | cccefcd91baedc2bac773d5c44bbedd34115173b7340b3407b52f9f62aa55152 | - | ol5_ia64_ELS | |
kernel-debug-2.6.18-419.0.0.0.14.el5.ia64.rpm | bda8c953d57fb6e3190a3eef68ebe8eeae10e1a746e7b252bcb23af162b8e2b7 | - | ol5_ia64_ELS | |
kernel-debug-devel-2.6.18-419.0.0.0.14.el5.ia64.rpm | 52ea99e7ca0558c2b6867f82c8d302f915776a7be15253f295b7760fda4a6b47 | - | ol5_ia64_ELS | |
kernel-devel-2.6.18-419.0.0.0.14.el5.ia64.rpm | 92578dc56f00770fd63e812ae405ae3d94f07b6831d6618994bd3498a897487d | - | ol5_ia64_ELS | |
kernel-doc-2.6.18-419.0.0.0.14.el5.noarch.rpm | a87c01f1171c1a555781e3a74f68696d1c594d9d080147fe0fbae04713b86dcb | - | ol5_ia64_ELS | |
kernel-headers-2.6.18-419.0.0.0.14.el5.ia64.rpm | 4b4fcc0ecabeddce9174e361693fd90c7d40e2795b2894cf0ab32948ad920bfa | - | ol5_ia64_ELS | |
kernel-xen-2.6.18-419.0.0.0.14.el5.ia64.rpm | f6ff189b4622222227f3baf2e55878bd051fe3b07d9cd686ab62c817351dc852 | - | ol5_ia64_ELS | |
kernel-xen-devel-2.6.18-419.0.0.0.14.el5.ia64.rpm | 32ebdb6fe5b94c6993dd1ede553f0be4c312591e2ec64d1912d8d8fc5f40def7 | - | ol5_ia64_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5-1.4.11-1.el5.ia64.rpm | 98878fd81c2ba47c68c3181ee18df875aa42d211f1576498a63af04d4e11ded8 | - | ol5_ia64_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5debug-1.4.11-1.el5.ia64.rpm | d2718e7111f86d2fdcfd553d2ecda3d630a5cb03e1a79ae44995c694c7620497 | - | ol5_ia64_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5xen-1.4.11-1.el5.ia64.rpm | 86c177d342f264e27112fa261a456132f9476fecd7e3a50381399f93aacaa422 | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5-2.0.5-2.el5.ia64.rpm | c064ddf86c237ee5c73f3559a44504e78cdee8f277da0ba36de036264d910aa4 | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5debug-2.0.5-2.el5.ia64.rpm | c86c937b59e74526aaab32ebad3f7140b666bf8ae2f82e094db90a995adf33cf | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5xen-2.0.5-2.el5.ia64.rpm | 0209995dea7873d70ab4640d2ba04ad4f6cb8a2fd5de1bc846ddabaf47db234c | - | ol5_ia64_ELS | |
Oracle Linux 5 (x86_64) | kernel-2.6.18-419.0.0.0.14.el5.src.rpm | 5f3a9ce03928df0604ea1df068a4b9349e3769e693563b7129cdc72950dd8c3c | - | ol5_x86_64_ELS |
ocfs2-2.6.18-419.0.0.0.14.el5-1.4.11-1.el5.src.rpm | b6ada598a12d38e985c92aa47d24f3df21f76f07f27fbd9d2cf0f092774d56db | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5-2.0.5-2.el5.src.rpm | a1b345a10c1344559e33ffe60a8c29cdb7b9d0638a4034e5ced34a67f2c3f22f | - | ol5_x86_64_ELS | |
kernel-2.6.18-419.0.0.0.14.el5.x86_64.rpm | 7594631ed89e197c12ea7f98629ec81872f4f7801e1e360d439de26200b55a3f | - | ol5_x86_64_ELS | |
kernel-debug-2.6.18-419.0.0.0.14.el5.x86_64.rpm | 543d84d38e5b7005a9d8d1fed1278e255b1a260aeaeaed897a049aa1fea61eee | - | ol5_x86_64_ELS | |
kernel-debug-devel-2.6.18-419.0.0.0.14.el5.x86_64.rpm | d408a3b9f93998a996bacdccf643986af23f8b070f8166e0ff9b134cae3b66e5 | - | ol5_x86_64_ELS | |
kernel-devel-2.6.18-419.0.0.0.14.el5.x86_64.rpm | e0336569295f931a437626a9af1158b4b980d7be02dfd9005b505bfd98af9c65 | - | ol5_x86_64_ELS | |
kernel-doc-2.6.18-419.0.0.0.14.el5.noarch.rpm | a87c01f1171c1a555781e3a74f68696d1c594d9d080147fe0fbae04713b86dcb | - | ol5_x86_64_ELS | |
kernel-headers-2.6.18-419.0.0.0.14.el5.x86_64.rpm | d8478a0d9e2f79c73b782203df28c3af68a7230f49e20456d6f74643f9be8703 | - | ol5_x86_64_ELS | |
kernel-xen-2.6.18-419.0.0.0.14.el5.x86_64.rpm | 4b2afdc0d15edff4dd810d1c6b55ca60d1fe342c29e918d11f1d73e247d0023f | - | ol5_x86_64_ELS | |
kernel-xen-devel-2.6.18-419.0.0.0.14.el5.x86_64.rpm | f102c99b8300f32952cd41766258270eadbc01b2b1583337a22c9c9294b52681 | - | ol5_x86_64_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5-1.4.11-1.el5.x86_64.rpm | 65fbda44691db2ac04b30afe24ead21520e6a32eab23b1d7c10d35d5aa592c33 | - | ol5_x86_64_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5debug-1.4.11-1.el5.x86_64.rpm | f54046f8556f516fae46dee9ab3135c9b5175963d38819c4bf0a9ec01544dd6d | - | ol5_x86_64_ELS | |
ocfs2-2.6.18-419.0.0.0.14.el5xen-1.4.11-1.el5.x86_64.rpm | dd80811f6c3366b83bfe3f8f532417c517f035aeef896be0ae5873c136a9dd6d | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5-2.0.5-2.el5.x86_64.rpm | 242db5ee98697678cd2474a5ccabb4c31b7482ee5abccc557ad65ba250bce068 | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5debug-2.0.5-2.el5.x86_64.rpm | 5dc1e75ee6d9391df45e725bac0332e9b1cecce001dff444f2f8fa06ad08757c | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.14.el5xen-2.0.5-2.el5.x86_64.rpm | ff51854ef78dce56d0f22048523ed49862572fd99c9fffeb70e84e7dd8779877 | - | ol5_x86_64_ELS |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team