ELSA-2019-4837

ELSA-2019-4837 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-11-12

Description


[4.1.12-124.32.3.2]
- x86/tsx: Add config options to set tsx=on|off|auto (Michal Hocko) [Orabug: 30419233] {CVE-2019-11135}
- x86/speculation/taa: Add documentation for TSX Async Abort (Pawan Gupta) [Orabug: 30419233] {CVE-2019-11135}
- x86/tsx: Add 'auto' option to the tsx= cmdline parameter (Pawan Gupta) [Orabug: 30419233] {CVE-2019-11135}
- kvm/x86: Export MDS_NO=0 to guests when TSX is enabled (Pawan Gupta) [Orabug: 30419233] {CVE-2019-11135}
- x86/speculation/taa: Add sysfs reporting for TSX Async Abort (Pawan Gupta) [Orabug: 30419233] {CVE-2019-11135}
- x86/speculation/taa: Add mitigation for TSX Async Abort (Kanth Ghatraju) [Orabug: 30419233] {CVE-2019-11135}
- x86/cpu: Add a 'tsx=' cmdline option with TSX disabled by default (Pawan Gupta) [Orabug: 30419233] {CVE-2019-11135}
- x86/cpu: Add a helper function x86_read_arch_cap_msr() (Pawan Gupta) [Orabug: 30419233] {CVE-2019-11135}
- x86/msr: Add the IA32_TSX_CTRL MSR (Pawan Gupta) [Orabug: 30419233] {CVE-2019-11135}

[4.1.12-124.32.3.1]
- kvm: x86: mmu: Recovery of shattered NX large pages (Junaid Shahid) [Orabug: 29967631] {CVE-2018-12207}
- kvm: Add helper function for creating VM worker threads (Junaid Shahid) [Orabug: 29967631] {CVE-2018-12207}
- kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [Orabug: 29967631] {CVE-2018-12207}
- kvm: x86: Do not release the page inside mmu_set_spte() (Junaid Shahid) [Orabug: 29967631] {CVE-2018-12207}
- x86/cpu: Add Tremont to the cpu vulnerability whitelist (Pawan Gupta) [Orabug: 29967631] {CVE-2018-12207}
- x86: Add ITLB_MULTIHIT bug infrastructure (Pawan Gupta) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: MMU: Move mapping_level_dirty_bitmap() call in mapping_level() (Takuya Yoshikawa) [Orabug: 29967631] {CVE-2018-12207}
- Revert 'KVM: x86: use the fast way to invalidate all pages' (Sean Christopherson) [Orabug: 29967631] {CVE-2018-12207}
- kvm: Convert kvm_lock to a mutex (Junaid Shahid) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: MMU: Simplify force_pt_level calculation code in FNAME(page_fault)() (Takuya Yoshikawa) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: MMU: Make force_pt_level bool (Takuya Yoshikawa) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (Takuya Yoshikawa) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: extend usage of RET_MMIO_PF_* constants (Paolo Bonzini) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: MMU: Make mmu_set_spte() return emulate value (Takuya Yoshikawa) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (Takuya Yoshikawa) [Orabug: 29967631] {CVE-2018-12207}
- KVM: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (Takuya Yoshikawa) [Orabug: 29967631] {CVE-2018-12207}


Related CVEs


CVE-2018-12207
CVE-2019-11135

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.32.3.2.el6uek.src.rpmc9a48ed36ef5b0e4043c8974bc100809bf31877e903ea3b96edf1008223ff639ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.32.3.2.el6uek.x86_64.rpmdd6a7f38ccbe18ab29d0c25d52d4c4d6be21c2284cd642a19a984cb34dfd4144ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.32.3.2.el6uek.x86_64.rpm3d42892ac5e6eb39371bce56c1c2281b9528537922c78fc7a354bdbc8909323cELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.32.3.2.el6uek.x86_64.rpma32335f63712e8c0fd296324bac0f54dc322a9ece41b398069d3841356177cd2ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.32.3.2.el6uek.x86_64.rpme323eede424f9cd5a1b26085dabad821c7b542a83464f1a338d0aeed00545a3fELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.32.3.2.el6uek.noarch.rpmcd56e99f88f1dfa9434cbe0fae2c73e71d21231177de05b222d726195e5fd04eELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.32.3.2.el6uek.noarch.rpm4e7caeed8ce72cfa3453872c65ea9819802d9f66c75c88260080efc271c9e3edELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.32.3.2.el7uek.src.rpm8a2fef9a9b93cb1b44b93852b611a64a9ffa9d150586e7b15c6cb098957545c6ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.32.3.2.el7uek.x86_64.rpmbe4c98257c31a0c4d2842776be1aadb8c79f26dcc7f185b1b7a5c5ab33c9970bELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.32.3.2.el7uek.x86_64.rpmddcf1cfe7ebf5647921b9bb62b23b122211e44590934edc12ba496a69c3ab653ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.32.3.2.el7uek.x86_64.rpm110c2e1a53094cf4a0f60383ff3c953922cc1574d6b473334270c727f26e22b8ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.32.3.2.el7uek.x86_64.rpm82294ef4d5cf87e16b27763269d1d397f4e6879d601ee7e06ca287ec2fb147bbELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.32.3.2.el7uek.noarch.rpmc517853e0e0faa10b75960ce0b4de1ff8bda3319789532a384b631519d18faeaELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.32.3.2.el7uek.noarch.rpm334f5e55f7c435675381bb06a521edd67c52ed79a56888dca71568b75f3b9520ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete