OVMSA-2019-0007 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2019-02-07 |
Description
[4.1.12-124.25.1]
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (Tom Lendacky) [Orabug: 28870524] {CVE-2018-3639}
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (Konrad Rzeszutek Wilk) [Orabug: 28870524] {CVE-2018-3639}
- x86/cpufeatures: rename X86_FEATURE_AMD_SSBD to X86_FEATURE_LS_CFG_SSBD (Mihai Carabas) [Orabug: 28870524] {CVE-2018-3639}
- Make file credentials available to the seqfile interfaces (Linus Torvalds) [Orabug: 29114879] {CVE-2018-17972}
- proc: restrict kernel stack dumps to root (Jann Horn) [Orabug: 29114879] {CVE-2018-17972}
- x86/speculation: Clean up retpoline code in bugs.c (Alejandro Jimenez) [Orabug: 29211617]
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (WANG Chao) [Orabug: 29211617]
- x86/build: Fix compiler support check for CONFIG_RETPOLINE (Masahiro Yamada) [Orabug: 29211617]
- x86/retpoline: Remove minimal retpoline support (Zhenzhong Duan) [Orabug: 29211617]
- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support (Zhenzhong Duan) [Orabug: 29211617]
- nl80211: check for the required netlink attributes presence (Vladis Dronov) [Orabug: 29245533] {CVE-2017-12153} {CVE-2017-12153}
- scsi: lpfc: Fix PT2PT PRLI reject (reapply patch) (James Smart) [Orabug: 29281346]
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-124.25.1.el6uek.src.rpm | ed35dd9aa1cbeb7a972147331ab6684f | OVMSA-2021-0016 |
| kernel-uek-4.1.12-124.25.1.el6uek.x86_64.rpm | b10428b24e18a01dece6db91a9df8101 | OVMSA-2021-0016 |
| kernel-uek-firmware-4.1.12-124.25.1.el6uek.noarch.rpm | dc0f640e3fdbcdf55c381548a2243078 | OVMSA-2021-0016 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team