OVMSA-2018-0012 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-01-19 |
Description
[4.1.12-112.14.13]
- Revert 'kernel.spec: Require the new microcode_ctl.' (Brian Maly)
[4.1.12-112.14.12]
- xen-blkback: add pending_req allocation stats (Ankur Arora) [Orabug: 27386890]
- xen-blkback: move indirect req allocation out-of-line (Ankur Arora) [Orabug: 27386890]
- xen-blkback: pull nseg validation out in a function (Ankur Arora) [Orabug: 27386890]
- xen-blkback: make struct pending_req less monolithic (Ankur Arora) [Orabug: 27386890]
- x86: Clean up IBRS functionality resident in common code (Kanth Ghatraju) [Orabug: 27403317]
- x86: Display correct settings for the SPECTRE_V2 bug (Kanth Ghatraju) [Orabug: 27403317]
- Set CONFIG_GENERIC_CPU_VULNERABILITIES flag (Kanth Ghatraju) [Orabug: 27403317]
- x86/cpu: Implement CPU vulnerabilites sysfs functions (Thomas Gleixner) [Orabug: 27403317]
- sysfs/cpu: Fix typos in vulnerability documentation (David Woodhouse) [Orabug: 27403317]
- sysfs/cpu: Add vulnerability folder (Thomas Gleixner) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (David Woodhouse) [Orabug: 27403317]
- x86/cpufeatures: Add X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27403317]
- KVM: x86: Add memory barrier on vmcs field lookup (Andrew Honig) {CVE-2017-5753}
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (Andrew Honig) [Orabug: 27402301] {CVE-2017-1000407} {CVE-2017-1000407}
- xfs: give all workqueues rescuer threads (Chris Mason) [Orabug: 27397568]
- ixgbevf: handle mbox_api_13 in ixgbevf_change_mtu (Joao Martins) [Orabug: 27397001]
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-112.14.13.el6uek.src.rpm | 1fd2763d15aeffb59d1448302232819a | OVMSA-2021-0016 |
| kernel-uek-4.1.12-112.14.13.el6uek.x86_64.rpm | 3b948eae28c1061bd34790329cb27e25 | OVMSA-2021-0016 |
| kernel-uek-firmware-4.1.12-112.14.13.el6uek.noarch.rpm | 0f308b55b9f51984e9b0f9725f34358a | OVMSA-2021-0016 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team