OVMSA-2019-0007 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2019-02-07 |
Description
[4.1.12-124.25.1]
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (Tom Lendacky) [Orabug: 28870524] {CVE-2018-3639}
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (Konrad Rzeszutek Wilk) [Orabug: 28870524] {CVE-2018-3639}
- x86/cpufeatures: rename X86_FEATURE_AMD_SSBD to X86_FEATURE_LS_CFG_SSBD (Mihai Carabas) [Orabug: 28870524] {CVE-2018-3639}
- Make file credentials available to the seqfile interfaces (Linus Torvalds) [Orabug: 29114879] {CVE-2018-17972}
- proc: restrict kernel stack dumps to root (Jann Horn) [Orabug: 29114879] {CVE-2018-17972}
- x86/speculation: Clean up retpoline code in bugs.c (Alejandro Jimenez) [Orabug: 29211617]
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (WANG Chao) [Orabug: 29211617]
- x86/build: Fix compiler support check for CONFIG_RETPOLINE (Masahiro Yamada) [Orabug: 29211617]
- x86/retpoline: Remove minimal retpoline support (Zhenzhong Duan) [Orabug: 29211617]
- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support (Zhenzhong Duan) [Orabug: 29211617]
- nl80211: check for the required netlink attributes presence (Vladis Dronov) [Orabug: 29245533] {CVE-2017-12153} {CVE-2017-12153}
- scsi: lpfc: Fix PT2PT PRLI reject (reapply patch) (James Smart) [Orabug: 29281346]
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-124.25.1.el6uek.src.rpm | 4122d8638a009c08030ce2f5e5e53dfb672dbe0b552ed634985bb67eeaed3d8e | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-4.1.12-124.25.1.el6uek.x86_64.rpm | 46cdd62c9fff876841b989ef38683cbd7ce004df34bc390238f41839fe8fd7cb | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-firmware-4.1.12-124.25.1.el6uek.noarch.rpm | 3f8d9b0b3904e8c077f651132ad173cc8e3d6a0321d9e0a6c582c585899234f4 | OVMSA-2025-0001 | ovm34_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team