Описание
ELSA-2019-4637: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.310.1]
- x86/speculation/mds: Make cpu_matches() __cpuinit (Patrick Colp) [Orabug: 29752091] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Only worry about firmware loaded microcode (Patrick Colp) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
[2.6.39-400.309.1]
- x86/mds: Add empty commit for CVE-2019-11091 (Patrick Colp) [Orabug: 29721938] {CVE-2019-11091}
- x86/speculation/mds: Fix comment (Boris Ostrovsky) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mitigation mode VMWERV (Thomas Gleixner) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add sysfs reporting for MDS (Thomas Gleixner) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mitigation control for MDS (Thomas Gleixner) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Allow runtime checking of CPU features (Patrick Colp) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Improve coverage for MDS vulnerability (Boris Ostrovsky) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Clear CPU buffers on exit to user (Thomas Gleixner) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add mds_clear_cpu_buffers() (Thomas Gleixner) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add BUG_MSBDS_ONLY (Thomas Gleixner) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation/mds: Add basic bug infrastructure for MDS (Andi Kleen) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
- x86/speculation: Consolidate CPU whitelists (Thomas Gleixner) [Orabug: 29641786] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.310.1.el5uek
kernel-uek-debug
2.6.39-400.310.1.el5uek
kernel-uek-debug-devel
2.6.39-400.310.1.el5uek
kernel-uek-devel
2.6.39-400.310.1.el5uek
kernel-uek-doc
2.6.39-400.310.1.el5uek
kernel-uek-firmware
2.6.39-400.310.1.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.310.1.el5uek
kernel-uek-debug
2.6.39-400.310.1.el5uek
kernel-uek-debug-devel
2.6.39-400.310.1.el5uek
kernel-uek-devel
2.6.39-400.310.1.el5uek
kernel-uek-doc
2.6.39-400.310.1.el5uek
kernel-uek-firmware
2.6.39-400.310.1.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.310.1.el6uek
kernel-uek-debug
2.6.39-400.310.1.el6uek
kernel-uek-debug-devel
2.6.39-400.310.1.el6uek
kernel-uek-devel
2.6.39-400.310.1.el6uek
kernel-uek-doc
2.6.39-400.310.1.el6uek
kernel-uek-firmware
2.6.39-400.310.1.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.310.1.el6uek
kernel-uek-debug
2.6.39-400.310.1.el6uek
kernel-uek-debug-devel
2.6.39-400.310.1.el6uek
kernel-uek-devel
2.6.39-400.310.1.el6uek
kernel-uek-doc
2.6.39-400.310.1.el6uek
kernel-uek-firmware
2.6.39-400.310.1.el6uek