Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2020-07-17 |
[2.6.32-754.31.1.OL6]
- Update genkey [bug 25599697]
[2.6.32-754.31.1]
- [x86] x86/speculation: Provide SRBDS late microcode loading support (Waiman Long) [1827185] {CVE-2020-0543}
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827185] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827185] {CVE-2020-0543}
- [netdrv] bonding/802.3ad: fix link_failure_count tracking (Patrick Talbert) [1841819]
- [mm] mm: migration: add migrate_entry_wait_huge() (Waiman Long) [1839653]
- [powerpc] powerpc/book3s64: Fix link stack flush on context switch (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: support nospectre_v2 cmdline option (Gustavo Duarte) [1796810]
- [powerpc] powerpc/security: Fix spectre_v2 reporting (Gustavo Duarte) [1796810]
- [powerpc] powerpc/fsl: Update Spectre v2 reporting (Gustavo Duarte) [1796810]
- [powerpc] powerpc/fsl: Add nospectre_v2 command line argument (Gustavo Duarte) [1796810]
- [powerpc] powerpc/fsl: Fix spectre_v2 mitigations reporting (Gustavo Duarte) [1796810]
- [powerpc] powerpc/pseries: Query hypervisor for count cache flush settings (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add support for software count cache flush (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add new security feature flags for count cache flush (Gustavo Duarte) [1796810]
- [powerpc] powerpc/asm: Add a patch_site macro & helpers for patching instructions (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Make meltdown reporting Book3S 64 specific (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Call setup_barrier_nospec() from setup_arch() (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Disable the speculation barrier from the command line (Gustavo Duarte) [1796810]
- [powerpc] powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Enhance the information in cpu_show_spectre_v1() (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64: Use barrier_nospec in syscall entry (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Enable barrier_nospec based on firmware settings (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Patch barrier_nospec in modules (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add support for ori barrier_nospec patching (Gustavo Duarte) [1796810]
- [powerpc] powerpc/64s: Add barrier_nospec (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Add helper to check if offset is within relative branch range (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Have patch_instruction detect faults (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Introduce asm-prototypes.h (Gustavo Duarte) [1796810]
- [powerpc] powerpc: Move local setup.h declarations to arch includes (Gustavo Duarte) [1796810]
CVE-2019-18660 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (i386) | kernel-2.6.32-754.31.1.el6.src.rpm | 113969dcfac7047938e92da2b4ed8ffc | ELSA-2021-9212 |
kernel-2.6.32-754.31.1.el6.i686.rpm | f42039fb527afe6b0751d43fa4c376b0 | ELSA-2021-9212 | |
kernel-abi-whitelists-2.6.32-754.31.1.el6.noarch.rpm | 0da5c6ac2d5feabdf1a9ead8e2ee2f08 | ELSA-2021-9212 | |
kernel-debug-2.6.32-754.31.1.el6.i686.rpm | a910e1c2405f0c7e1344ec797f420a9c | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-754.31.1.el6.i686.rpm | 673f3facdf58b15d9f14a9ee59868d2e | ELSA-2021-9212 | |
kernel-devel-2.6.32-754.31.1.el6.i686.rpm | 9b84a1d3a6d5b3991a98e247399010c9 | ELSA-2021-9212 | |
kernel-doc-2.6.32-754.31.1.el6.noarch.rpm | a885fe8e2a015fdd5741b2db57d1c161 | ELSA-2021-9212 | |
kernel-firmware-2.6.32-754.31.1.el6.noarch.rpm | 6f01aed985ee498b154741ba748cb160 | ELSA-2021-9212 | |
kernel-headers-2.6.32-754.31.1.el6.i686.rpm | dff62ae1acf0b24702579fa4fd540cdc | ELSA-2021-9212 | |
perf-2.6.32-754.31.1.el6.i686.rpm | 28f0611de4790d2ddb4fa37d86ec3efc | ELSA-2021-9212 | |
python-perf-2.6.32-754.31.1.el6.i686.rpm | 5635240160ce521d791e88d1770f3c90 | ELSA-2021-9212 | |
Oracle Linux 6 (x86_64) | kernel-2.6.32-754.31.1.el6.src.rpm | 113969dcfac7047938e92da2b4ed8ffc | ELSA-2021-9212 |
kernel-2.6.32-754.31.1.el6.x86_64.rpm | 613e16618feb4f7eadabbfd6d4a8901c | ELSA-2021-9212 | |
kernel-abi-whitelists-2.6.32-754.31.1.el6.noarch.rpm | 0da5c6ac2d5feabdf1a9ead8e2ee2f08 | ELSA-2021-9212 | |
kernel-debug-2.6.32-754.31.1.el6.x86_64.rpm | 151c33c1e451eb7de9c0f4284d2c9fcb | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-754.31.1.el6.i686.rpm | 673f3facdf58b15d9f14a9ee59868d2e | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-754.31.1.el6.x86_64.rpm | 49f0f453669a97caf65539f62353e34f | ELSA-2021-9212 | |
kernel-devel-2.6.32-754.31.1.el6.x86_64.rpm | 52170325e08deb62634ac120f4244b67 | ELSA-2021-9212 | |
kernel-doc-2.6.32-754.31.1.el6.noarch.rpm | a885fe8e2a015fdd5741b2db57d1c161 | ELSA-2021-9212 | |
kernel-firmware-2.6.32-754.31.1.el6.noarch.rpm | 6f01aed985ee498b154741ba748cb160 | ELSA-2021-9212 | |
kernel-headers-2.6.32-754.31.1.el6.x86_64.rpm | 06d1b667fef829dac1bfaa915a9a65b0 | ELSA-2021-9212 | |
perf-2.6.32-754.31.1.el6.x86_64.rpm | 85fa6d4946f5711120fbcd9608095e96 | ELSA-2021-9212 | |
python-perf-2.6.32-754.31.1.el6.x86_64.rpm | 11057290a893a907aa297070233fc900 | ELSA-2021-9212 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team