Описание
ELSA-2018-1196-1: kernel security and bug fix update (IMPORTANT)
kernel [2.6.18-419.0.0.0.10]
- Backport CVE-2017-5715 to RHCK/OL5 [orabug 27787723]
[2.6.18-419.0.0.0.9]
- rebuild with retpoline compiler
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-419.0.0.0.10.el5
kernel-debug
2.6.18-419.0.0.0.10.el5
kernel-debug-devel
2.6.18-419.0.0.0.10.el5
kernel-devel
2.6.18-419.0.0.0.10.el5
kernel-doc
2.6.18-419.0.0.0.10.el5
kernel-headers
2.6.18-419.0.0.0.10.el5
kernel-xen
2.6.18-419.0.0.0.10.el5
kernel-xen-devel
2.6.18-419.0.0.0.10.el5
ocfs2-2.6.18-419.0.0.0.10.el5
1.4.11-1.el5
ocfs2-2.6.18-419.0.0.0.10.el5debug
1.4.11-1.el5
ocfs2-2.6.18-419.0.0.0.10.el5xen
1.4.11-1.el5
oracleasm-2.6.18-419.0.0.0.10.el5
2.0.5-2.el5
oracleasm-2.6.18-419.0.0.0.10.el5debug
2.0.5-2.el5
oracleasm-2.6.18-419.0.0.0.10.el5xen
2.0.5-2.el5
Oracle Linux i386
kernel
2.6.18-419.0.0.0.10.el5
kernel-PAE
2.6.18-419.0.0.0.10.el5
kernel-PAE-devel
2.6.18-419.0.0.0.10.el5
kernel-debug
2.6.18-419.0.0.0.10.el5
kernel-debug-devel
2.6.18-419.0.0.0.10.el5
kernel-devel
2.6.18-419.0.0.0.10.el5
kernel-doc
2.6.18-419.0.0.0.10.el5
kernel-headers
2.6.18-419.0.0.0.10.el5
kernel-xen
2.6.18-419.0.0.0.10.el5
kernel-xen-devel
2.6.18-419.0.0.0.10.el5
ocfs2-2.6.18-419.0.0.0.10.el5
1.4.11-1.el5
ocfs2-2.6.18-419.0.0.0.10.el5PAE
1.4.11-1.el5
ocfs2-2.6.18-419.0.0.0.10.el5debug
1.4.11-1.el5
ocfs2-2.6.18-419.0.0.0.10.el5xen
1.4.11-1.el5
oracleasm-2.6.18-419.0.0.0.10.el5
2.0.5-2.el5
oracleasm-2.6.18-419.0.0.0.10.el5PAE
2.0.5-2.el5
oracleasm-2.6.18-419.0.0.0.10.el5debug
2.0.5-2.el5
oracleasm-2.6.18-419.0.0.0.10.el5xen
2.0.5-2.el5
Связанные CVE
Связанные уязвимости
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and indir ...