Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2018-0395
History
Mar 07, 2018 - 12:00 a.m.
Vulners
/
Oraclelinux
/
kernel security and bug fix update
kernel security and bug fix update
2018-03-07
00:00:00
linux.oracle.com
176
EPSS
0.001
Percentile
26.7%
JSON
[3.10.0-693.21.1.OL7]
Oracle Linux certificates (Alexey Petrenko)
Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(
[email protected]
)
Update x509.genkey [bug 24817676]
[3.10.0-693.21.1]
[x86] platform/uv: Mark tsc_check_sync as an init function (Frank Ramsay) [1547870 1526066]
[x86] platform/uv: Add check of TSC state set by UV BIOS (Frank Ramsay) [1547870 1526066]
[x86] tsc: Provide a means to disable TSC ART (Frank Ramsay) [1547870 1526066]
[x86] tsc: Drastically reduce the number of firmware bug warnings (Frank Ramsay) [1547870 1526066]
[x86] tsc: Skip TSC test and error messages if already unstable (Frank Ramsay) [1547870 1526066]
[x86] tsc: Add option that TSC on Socket 0 being non-zero is valid (Frank Ramsay) [1547870 1526066]
[x86] tsc: Remove the TSC_ADJUST clamp (Frank Ramsay) [1547870 1526066]
[3.10.0-693.20.1]
[x86] locking/qspinlock: Fix kabi problem in a non-KVM/XEN VM (Waiman Long) [1539797 1533529]
[3.10.0-693.19.1]
[watchdog] hpwdt: remove indirect call in drivers/watchdog/hpwdt.c (Josh Poimboeuf) [1539649 1535644]
[kernel] x86/spec_ctrl: cleanup __ptrace_may_access (Josh Poimboeuf) [1539649 1535644]
[x86] bugs: Drop one ‘mitigation’ from dmesg (Josh Poimboeuf) [1539649 1535644]
[x86] kvm: vmx: Make indirect call speculation safe (Josh Poimboeuf) [1539649 1535644]
[x86] kvm: x86: Make indirect calls in emulator speculation safe (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline: Optimize inline assembler for vmexit_fill_RSB (Josh Poimboeuf) [1539649 1535644]
[x86] mce: Make machine check speculation protected (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: fix ptrace IBPB optimization (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: Avoid returns in IBRS-disabled regions (Josh Poimboeuf) [1539649 1535644]
[x86] spectre/meltdown: avoid the vulnerability directory to weaken kernel security (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: Document retpolines and ibrs_enabled=3 (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: upgrade GCC retpoline warning to an error (Josh Poimboeuf) [1539649 1535644]
[x86] Use IBRS for firmware update path (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: stuff RSB on context switch with SMEP enabled (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: enforce sane combinations of IBRS and retpoline (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: use upstream RSB stuffing function (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: add ibrs_enabled=3 (ibrs_user) (Josh Poimboeuf) [1539649 1535644]
[kernel] x86/jump_label: warn on failed jump label patch (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: detect unretpolined modules (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline: Add LFENCE to the retpoline/RSB filling RSB macros (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline: Fill return stack buffer on vmexit (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline/xen: Convert Xen hypercall indirect jumps (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline/hyperv: Convert assembler indirect jumps (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline/ftrace: Convert ftrace assembler indirect jumps (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline/entry: Convert entry assembler indirect jumps (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline/crypto: Convert crypto assembler indirect jumps (Josh Poimboeuf) [1539649 1535644]
[x86] retpoline: Add initial retpoline support (Josh Poimboeuf) [1539649 1535644]
[x86] jump_label: add asm support for static keys (Josh Poimboeuf) [1539649 1535644]
[x86] asm: Make asm/alternative.h safe from assembly (Josh Poimboeuf) [1539649 1535644]
[tools] objtool: Support new GCC 6 switch jump table pattern (Josh Poimboeuf) [1539649 1535644]
[tools] objtool: Detect jumps to retpoline thunks (Josh Poimboeuf) [1539649 1535644]
[x86] spectre: Add boot time option to select Spectre v2 mitigation (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: print features changed by microcode loading (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: refactor the init and microcode loading paths (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: move initialization of X86_FEATURE_IBPB_SUPPORT (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: remove SPEC_CTRL_PCP_IBPB bit (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: remove ibrs_enabled variable (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: add ibp_disabled variable (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: add X86_FEATURE_IBP_DISABLE (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: remove IBP disable for AMD model 0x16 (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: remove performance measurements from documentation (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: make ipbp_enabled read-only (Josh Poimboeuf) [1539649 1535644]
[x86] spec_ctrl: remove ibpb_enabled=2 mode (Josh Poimboeuf) [1539649 1535644]
[x86] cpu: Implement CPU vulnerabilites sysfs functions (Josh Poimboeuf) [1539649 1535644]
[base] sysfs/cpu: Add vulnerability folder (Josh Poimboeuf) [1539649 1535644]
[x86] cpu: Merge bugs.c and bugs_64.c (Josh Poimboeuf) [1539649 1535644]
[x86] syscall: int80 must not clobber r12-15 (Josh Poimboeuf) [1539649 1535644]
[x86] syscall: change ia32_syscall() to create the full register frame in ia32_do_call() (Josh Poimboeuf) [1539649 1535644]
[x86] boot: Add early cmdline parsing for options with arguments (Josh Poimboeuf) [1539649 1535644]
[x86] boot: Pass in size to early cmdline parsing (Josh Poimboeuf) [1539649 1535644]
[x86] boot: Simplify early command line parsing (Josh Poimboeuf) [1539649 1535644]
[x86] boot: Fix early command-line parsing when partial word matches (Josh Poimboeuf) [1539649 1535644]
[x86] boot: Fix early command-line parsing when matching at end (Josh Poimboeuf) [1539649 1535644]
[scsi] storvsc: Fix scsi_cmd error assignments in storvsc_handle_error (Cathy Avery) [1536978 1502601]
[fs] nfs: RPC_MAX_AUTH_SIZE is in bytes (‘J. Bruce Fields’) [1533378 1495321]
[fs] nfsd: give out fewer session slots as limit approaches (Dave Wysochanski) [1533377 1492234]
[fs] nfsd: increase DRC cache limit (Dave Wysochanski) [1533377 1492234]
[x86] kvm: x86: fix RSM when PCID is non-zero (Paolo Bonzini) [1531662 1530711]
[x86] iommu/amd: Reduce delay waiting for command buffer space (Suravee Suthikulpanit) [1531456 1508644]
[x86] iommu/amd: Reduce amount of MMIO when submitting commands (Suravee Suthikulpanit) [1531456 1508644]
[x86] amd: Remove cmd_buf_size and evt_buf_size from struct amd_iommu (Suravee Suthikulpanit) [1531456 1508644]
[x86] amd: Fix the left value check of cmd buffer (Suravee Suthikulpanit) [1531456 1508644]
[x86] amd: Don’t put completion-wait semaphore on stack (Suravee Suthikulpanit) [1531456 1508644]
[x86] kvm: svm: obey guest PAT (Suravee Suthikulpanit) [1530976 1478185]
[tty] serial: 8250_pci: Add Amazon PCI serial device ID (Vitaly Kuznetsov) [1530137 1527545]
[ata] libata: sata_down_spd_limit should return if driver has not recorded sstatus speed (David Milburn) [1530136 1457140]
[fs] nfs: fix a deadlock in nfs client initialization (Scott Mayhew) [1530135 1506382]
[fs] nfsv4.0: Fix a lock leak in nfs40_walk_client_list (Scott Mayhew) [1530135 1506382]
[fs] nfs: Create a common nfs4_match_client() function (Scott Mayhew) [1530135 1506382]
[fs] autofs - revert: take more care to not update last_used on path walk (Ian Kent) [1525994 1489542]
[vhost] vhost_net: correctly check tx avail during rx busy polling (Jason Wang) [1523784 1487551]
[crypto] shash - Fix has_key setting (Herbert Xu) [1522932 1505817]
[block] Fix a race between blk_cleanup_queue() and timeout handling (Ming Lei) [1522698 1513725]
[x86] tsc: Force TSC_ADJUST register to value >= zero (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Validate cpumask pointer before accessing it (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Try to adjust TSC if sync test fails (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Prepare warp test for TSC adjustment (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Move sync cleanup to a safe place (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Sync test only for the first cpu in a package (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Verify TSC_ADJUST from idle (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Store and check TSC ADJUST MSR (Prarit Bhargava) [1519850 1497055]
[x86] tsc: Detect random warps (Prarit Bhargava) [1519850 1497055]
[x86] kvm: mmu: always terminate page walks at level 1 (Paolo Bonzini) [1500382 1500381] {CVE-2017-12188}
[x86] kvm: nVMX: update last_nonleaf_level when initializing nested EPT (Denys Vlasenko) [1500382 1500381] {CVE-2017-12188}
[x86] kvm: fix singlestepping over syscall (Paolo Bonzini) [1464480 1464481] {CVE-2017-7518}
[3.10.0-693.18.1]
[md] raid5: fix a race condition in stripe batch (Nigel Croxon) [1535883 1496836]
[security] selinux: fix double free in selinux_parse_opts_str() (Paul Moore) [1532288 1456843]
[fs] nfs: revert ‘nfs: Move the flock open mode check into nfs_flock()’ (Benjamin Coddington) [1531095 1497225]
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
7
src
kernel
< 3.10.0-693.21.1.el7
kernel-3.10.0-693.21.1.el7.src.rpm
oracle linux
7
x86_64
kernel
< 3.10.0-693.21.1.el7
kernel-3.10.0-693.21.1.el7.x86_64.rpm
oracle linux
7
noarch
kernel-abi-whitelists
< 3.10.0-693.21.1.el7
kernel-abi-whitelists-3.10.0-693.21.1.el7.noarch.rpm
oracle linux
7
x86_64
kernel-debug
< 3.10.0-693.21.1.el7
kernel-debug-3.10.0-693.21.1.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-debug-devel
< 3.10.0-693.21.1.el7
kernel-debug-devel-3.10.0-693.21.1.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-devel
< 3.10.0-693.21.1.el7
kernel-devel-3.10.0-693.21.1.el7.x86_64.rpm
oracle linux
7
noarch
kernel-doc
< 3.10.0-693.21.1.el7
kernel-doc-3.10.0-693.21.1.el7.noarch.rpm
oracle linux
7
x86_64
kernel-headers
< 3.10.0-693.21.1.el7
kernel-headers-3.10.0-693.21.1.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-tools
< 3.10.0-693.21.1.el7
kernel-tools-3.10.0-693.21.1.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-tools-libs
< 3.10.0-693.21.1.el7
kernel-tools-libs-3.10.0-693.21.1.el7.x86_64.rpm
Rows per page:
10
1-10 of 13
1
Related
redhat 2
openvas 30
nessus 35
centos 1
debiancve 2
ubuntucve 2
ubuntu 8
veracode 2
nvd 2
cve 2
prion 2
redhatcve 2
cvelist 2
suse 5
oraclelinux 3
virtuozzo 1
altlinux 1
photon 6
mageia 9
osv 1
debian 2
cloudfoundry 1
redhat
redhat
(RHSA-2018:0395) Important: kernel security and bug fix update
2018-03-06 18:36:56
(RHSA-2018:0412) Important: kernel-rt security and bug fix update
2018-03-06 18:36:53
openvas
openvas
30
CentOS Update for kernel CESA-2018:0395 centos7
2018-03-14 00:00:00
Ubuntu: Security Advisory (USN-3488-1)
2017-11-22 00:00:00
Ubuntu: Security Advisory (USN-3484-1)
2017-11-22 00:00:00
nessus
nessus
35
Oracle Linux 7 : kernel (ELSA-2018-0395)
2018-03-08 00:00:00
CentOS 7 : kernel (CESA-2018:0395)
2018-03-12 00:00:00
RHEL 7 : kernel (RHSA-2018:0395)
2018-03-07 00:00:00
centos
centos
kernel, perf, python security update
2018-03-09 23:54:41
debiancve
debiancve
CVE-2017-12188
2017-10-11 15:29:00
CVE-2017-7518
2018-07-30 15:29:00
ubuntucve
ubuntucve
CVE-2017-12188
2017-10-11 00:00:00
CVE-2017-7518
2017-06-23 00:00:00
ubuntu
ubuntu
8
Linux kernel (Azure) vulnerability
2017-11-21 00:00:00
Linux kernel (HWE) vulnerability
2017-11-21 00:00:00
Linux kernel (GCP) vulnerability
2017-11-21 00:00:00
veracode
veracode
Arbitrary Code Execution
2019-01-15 09:21:33
Privilege Escalation
2019-05-16 02:22:46
nvd
nvd
CVE-2017-12188
2017-10-11 15:29:00
CVE-2017-7518
2018-07-30 15:29:00
cve
cve
CVE-2017-12188
2017-10-11 15:29:00
CVE-2017-7518
2018-07-30 15:29:00
prion
prion
Stack overflow
2017-10-11 15:29:00
Design/Logic Flaw
2018-07-30 15:29:00
redhatcve
redhatcve
CVE-2017-12188
2017-10-10 13:49:44
CVE-2017-7518
2019-10-10 23:49:03
cvelist
cvelist
CVE-2017-12188
2017-10-11 15:00:00
CVE-2017-7518
2018-07-30 13:00:00
suse
suse
5
Security update for the Linux Kernel (important)
2017-07-08 15:09:39
Security update for the Linux Kernel (important)
2017-10-27 18:31:25
Security update for the Linux Kernel (important)
2017-11-08 21:08:45
oraclelinux
oraclelinux
Unbreakable Enterprise kernel security update
2018-04-10 00:00:00
Unbreakable Enterprise kernel security update
2018-04-18 00:00:00
kernel security, bug fix, and enhancement update
2018-04-16 00:00:00
virtuozzo
virtuozzo
Important kernel security update: CVE-2017-12188 and other; Virtuozzo ReadyKernel patch 35.2 for Virtuozzo 7.0.4, 7.0.4 HF3, and 7.0.5
2017-10-23 00:00:00
altlinux
altlinux
Security fix for the ALT Linux 7 package kernel-image-un-def version 1:4.1.47-alt0.M70P.1
2017-12-08 00:00:00
photon
photon
6
Home Download Photon OS User Documentation FAQ Security Advisories Related Information Lightwave - PHSA-2017-0043
2017-11-14 00:00:00
Home Download Photon OS User Documentation FAQ Security Advisories Related Information Lightwave - PHSA-2018-2.0-0101
2018-10-10 00:00:00
Important Photon OS Security Update - PHSA-2018-0101
2018-10-10 00:00:00
mageia
mageia
9
kernel-linus update provides 4.14 series and fixes security vulnerabilities
2018-01-06 03:53:31
Updated kernel-linus packages fix security vulnerabilities
2017-10-24 08:50:58
kernel update provides 4.14 series and fixes security vulnerabilities
2018-01-06 03:53:31
osv
osv
linux - security update
2017-09-20 00:00:00
debian
debian
[SECURITY] [DSA 3981-1] linux security update
2017-09-20 21:35:52
[SECURITY] [DSA 3981-1] linux security update
2017-09-20 21:35:52
cloudfoundry
cloudfoundry
USN-3619-2: Linux kernel (Xenial HWE) vulnerabilities | Cloud Foundry
2018-05-02 00:00:00
EPSS
0.001
Percentile
26.7%
JSON
Related for ELSA-2018-0395
redhat
2
openvas
30
nessus
35
centos
1
debiancve
2
ubuntucve
2
ubuntu
8
veracode
2
nvd
2
cve
2
prion
2
redhatcve
2
cvelist
2
suse
5
oraclelinux
3
virtuozzo
1
altlinux
1
photon
6
mageia
9
osv
1
debian
2
cloudfoundry
1