Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2018-2384
History
Aug 14, 2018 - 12:00 a.m.
Vulners
/
Oraclelinux
/
kernel security and bug fix update
kernel security and bug fix update
2018-08-14
00:00:00
linux.oracle.com
106
EPSS
0.783
Percentile
98.3%
JSON
[3.10.0-862.11.6.OL7]
Oracle Linux certificates (Alexey Petrenko)
Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(
[email protected]
)
Update x509.genkey [bug 24817676]
[3.10.0-862.11.6]
[kernel] cpu/hotplug: Fix ‘online’ sysfs entry with ‘nosmt’ (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[3.10.0-862.11.5]
[kernel] cpu/hotplug: Enable ‘nosmt’ as late as possible (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[3.10.0-862.11.4]
[net] ipv6: fix nospec-related regression in ipv6_addr_prefix() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3693}
[3.10.0-862.11.3]
[net] tcp: add tcp_ooo_try_coalesce() helper (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: call tcp_drop() from tcp_data_queue_ofo() (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: detect malicious patterns in tcp_collapse_ofo_queue() (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: avoid collapses in tcp_prune_queue() if possible (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: free batches of packets in tcp_prune_ofo_queue() (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] net: add rb_to_skb() and other rb tree helpers (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: fix a stale ooo_last_skb after a replace (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: use an RB tree for ooo receive queue (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: refine tcp_prune_ofo_queue() to not drop all packets (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[net] tcp: increment sk_drops for dropped rx packets (Paolo Abeni) [1611368 1611369] {CVE-2018-5390}
[x86] x86/syscall: Fix regression when using the last syscall (pkey_free) (Lauro Ramos Venancio) [1589033 1589035] {CVE-2018-3693}
[3.10.0-862.11.2]
[kernel] cpu: hotplug: detect SMT disabled by BIOS (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[documentation] l1tf: Fix typos (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Remove extra newline in vmentry_l1d_flush sysfs file (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Initialize the vmx_l1d_flush_pages’ content (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation: l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[documentation] Add section about CPU vulnerabilities (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs, kvm: introduce boot-time control of L1TF mitigations (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Set CPU_SMT_NOT_SUPPORTED early (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Expose SMT control init function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Allow runtime control of L1D flush (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Serialize L1D flush parameter setter (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Add static key for flush always (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Move l1tf setup function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Handle EPT disabled state proper (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Drop L1TF MSR list approach (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] litf: Introduce vmx status variable (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs: Make cpu_show_common() static (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs: Concentrate bug reporting into a separate function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Online siblings when SMT control is turned on (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Use MSR save list for IA32_FLUSH_CMD if required (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Extend add_atomic_switch_msr() to allow VMENTER only MSRs (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Separate the VMX AUTOLOAD guest/host number accounting (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Add find_msr() helper function (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: vmx: Split the VMX MSR LOAD structures to have an host/guest numbers (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: mitigation for L1 cache terminal fault vulnerabilities, part 3 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: Warn user if KVM is loaded SMT and L1TF CPU bug being present (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu: hotplug: Boot HT siblings at least once, part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: fix typo in l1tf mitigation string (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: protect _PAGE_FILE PTEs against speculation (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: mitigation for L1 cache terminal fault vulnerabilities, part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Boot HT siblings at least once (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
Revert ‘x86/apic: Ignore secondary threads if nosmt=force’ (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: Fix up pte->pfn conversion for PAE (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: Protect PAE swap entries against L1TF (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] speculation/l1tf: Extend 64bit swap file size limit (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/AMD: Remove the pointless detect_ht() call (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] bugs: Move the l1tf function and define pr_fmt properly (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Provide knobs to control SMT, part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] topology: Provide topology_smt_supported() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] smp: Provide topology_is_primary_thread(), part 2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] apic: Ignore secondary threads if nosmt=force (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/AMD: Evaluate smp_num_siblings early (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] CPU/AMD: Do not check CPUID max ext level before parsing SMP info (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/intel: Evaluate smp_num_siblings early (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/topology: Provide detect_extended_topology_early() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu/common: Provide detect_ht_early() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] cpu: Remove the pointless CPU printout (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Provide knobs to control SMT (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[kernel] cpu/hotplug: Split do_cpu_down() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] smp: Provide topology_is_primary_thread() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] CPU: Modify detect_extended_topology() to return result (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: fix build for CONFIG_NUMA_BALANCING=n (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: sync with latest L1TF patches (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: protect _PAGE_NUMA PTEs and PMDs against speculation (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[mm] l1tf: Disallow non privileged high MMIO PROT_NONE mappings (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Report if too much memory for L1TF workaround (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Limit swap file size to MAX_PA/2 (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Add sysfs reporting for l1tf (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Make sure the first page is always reserved (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Protect PROT_NONE PTEs against speculation (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Protect swap entries against L1TF (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] l1tf: Increase 32bit PAE __PHYSICAL_PAGE_MASK (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] mm: Fix swap entry comment and macro (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] spec_ctrl: sync with upstream cpu_set_bug_bits() (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] add support for L1D flush MSR (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[x86] kvm: mitigation for L1 cache terminal fault vulnerabilities (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
[3.10.0-862.11.1]
[tcmu] allow userspace to reset ring (Xiubo Li) [1599669 1562587]
[tcmu] remove commands_lock (Xiubo Li) [1599669 1562587]
[tcmu] move expired command completion to unmap thread (Xiubo Li) [1599669 1562587]
[tcmu] add cmd timeout handling wq (Xiubo Li) [1599669 1562587]
[tcmu] don’t block submitting context for block waits (Xiubo Li) [1599669 1562587]
[tcmu] fix double se_cmd completion (Xiubo Li) [1599669 1562587]
[tcmu] replace spin lock with mutex (Xiubo Li) [1599669 1562587]
[target] add SAM_STAT_BUSY sense reason (Xiubo Li) [1599669 1562587]
[target] core: add device action configfs files (Xiubo Li) [1599669 1562587]
[target] Avoid mappedlun symlink creation during lun shutdown (Xiubo Li) [1599656 1585081]
[spectre] update Spectre v1 mitigation string (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[spectre] fix hiddev nospec issues (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] syscall: clarify clobbered registers in entry code (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[powerpc] add missing barrier_nospec() in __get_user64_nocheck() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[spectre] fix gadgets found by smatch scanner (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] rme9652: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] hdspm: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] asihpi: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] opl3: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] hda: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] seq: oss: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] seq: oss: Fix unbalanced use lock for synth MIDI device (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[net] atm: Fix potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[kernel] time: Protect posix clock array access against speculation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[kernel] sys.c: fix potential Spectre v1 issue (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[sched] autogroup: Fix possible Spectre-v1 indexing for sched_prio_to_weight[] (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[perf] core: Fix possible Spectre-v1 indexing for ->aux_pages[] (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[sysvipc] sem: mitigate semnum index against spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[alsa] control: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[usbip] vhci_sysfs: fix potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[media] dvb_ca_en50221: prevent using slot_info for Spectre attacs (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[media] dvb_ca_en50221: sanity check slot number from userspace (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[atm] zatm: Fix potential Spectre v1 (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] kvm: Update spectre-v1 mitigation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] kvm: Add memory barrier on vmcs field lookup (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] perf/msr: Fix possible Spectre-v1 indexing in the MSR driver (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] perf: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] perf: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[net] nl80211: Sanitize array index in parse_txq_params (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] vfs, fdtable: Prevent bounds-check bypass via speculative execution (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] syscall: Sanitize syscall table de-references under speculation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[powerpc] Use barrier_nospec in copy_from_user() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Introduce barrier_nospec for other arches (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] Introduce barrier_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] spectre_v1: Disable compiler optimizations over array_index_mask_nospec() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] Implement array_index_mask_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[documentation] Document array_index_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
dependency (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Allow index argument to have const-qualified type (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Kill array_index_nospec_mask_check() (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] nospec: Move array_index_nospec() parameter checking into separate macro (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[include] array_index_nospec: Sanitize speculative array de-references (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] get_user: Use pointer masking to limit speculation (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] Introduce __uaccess_begin_nospec() and uaccess_try_nospec (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] usercopy: Replace open coded stac/clac with _
uaccess
{begin, end} (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] reorganize SMAP handling in user space accesses (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] uaccess: Tell the compiler that uaccess is unlikely to fault (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[x86] uaccess: fix sparse errors (Josh Poimboeuf) [1589033 1589035] {CVE-2018-3690}
[3.10.0-862.10.1]
[x86] add _TIF_UPROBE to _TIF_DO_NOTIFY_MASK (Oleg Nesterov) [1595155 1579521]
[x86] spec_ctrl: Always clear SPEC_CTRL MSRs when disabling IBRS (Radomir Vrbovsky) [1586150 1574730]
[sound] alsa: hda/realtek - Add headset mode support for Dell laptop (Jaroslav Kysela) [1588946 1528587]
[sound] alsa: hda/realtek - Support headset mode for ALC215/ALC285/ALC289 (Jaroslav Kysela) [1593586 1535427]
[mm] compaction: release zone irqlock in isolate_freepages_block (Andrea Arcangeli) [1596283 1582793]
[mm] compaction: change the timing to check to drop the spinlock (Andrea Arcangeli) [1596283 1582793]
[fs] dcache.c: add cond_resched() in shrink_dentry_list() (Aaron Tomlin) [1596184 1584693]
[misc] vmware balloon: Treat init like reset (Cathy Avery) [1595601 1540110]
[netdrv] qede: Fix ref-cnt usage count (Chad Dupuis) [1594700 1574847]
[x86] kvm: fix LAPIC timer drift when guest uses periodic mode (‘Dr. David Alan Gilbert’) [1594292 1584775]
[x86] kvm: remove APIC Timer periodic/oneshot spikes (‘Dr. David Alan Gilbert’) [1594292 1584775]
[netdrv] mlx4_en: Increase number of default RX rings (Erez Alfasi) [1594127 1520295]
[netdrv] mlx4_en: Limit the number of RX rings (Erez Alfasi) [1594127 1520295]
[netdrv] mlx4_en: Limit the number of TX rings (Erez Alfasi) [1594127 1520295]
[fs] ceph: don’t set read_ahead_kb to 0 by default (Ilya Dryomov) [1590825 1579539]
[scsi] qla2xxx: Remove stale debug value for login_retry flag (Himanshu Madhani) [1588937 1578880]
[x86] topology: Update the ‘cpu cores’ field in /proc/cpuinfo correctly across CPU hotplug operations (Prarit Bhargava) [1588563 1582023]
[acpi] osi: Add OEM _OSI strings to disable NVidia RTD3 (Jaroslav Kysela) [1584685 1581391]
[hv] vmbus: Fix a rescind issue (Eduardo Otubo) [1582124 1518498]
[linux] libata: enable host-wide tags (Ewan Milne) [1581728 1491014]
[ata] libata: remove ATA_FLAG_LOWTAG (Ewan Milne) [1581728 1491014]
[ata] Add a new flag to destinguish sas controller (Ewan Milne) [1581728 1491014]
[ata] libata: make sata_sil24 use fifo tag allocator (Ewan Milne) [1581728 1491014]
[ata] libata: move sas ata tag allocation to libata-scsi.c (Ewan Milne) [1581728 1491014]
[ata] libata: use blk taging (Ewan Milne) [1581728 1491014]
[nvme] rdma: Use mr pool (David Milburn) [1581347 1547273]
[nvme] rdma: Check remotely invalidated rkey matches our expected rkey (David Milburn) [1581347 1547273]
[nvme] rdma: wait for local invalidation before completing a request (David Milburn) [1581347 1547273]
[nvme] rdma: don’t complete requests before a send work request has completed (David Milburn) [1581347 1547273]
[nvme] rdma: don’t suppress send completions (David Milburn) [1581347 1547273]
[x86] kvm: Fix loss of pending INIT due to race (Radim Krcmar) [1580467 1569473]
[mm] mempolicy: fix use after free when calling get_mempolicy (Augusto Caringi) [1576759 1576755] {CVE-2018-10675}
[sound] alsa: seq: Fix racy pool initializations (Jaroslav Kysela) [1550171 1593586 1550169 1535427] {CVE-2018-7566}
[crypto] algif_skcipher: Load TX SG list after waiting (Bruno Eduardo de Oliveira Meneguele) [1541870 1541875] {CVE-2017-13215}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
7
src
kernel
< 3.10.0-862.11.6.el7
kernel-3.10.0-862.11.6.el7.src.rpm
oracle linux
7
x86_64
kernel
< 3.10.0-862.11.6.el7
kernel-3.10.0-862.11.6.el7.x86_64.rpm
oracle linux
7
noarch
kernel-abi-whitelists
< 3.10.0-862.11.6.el7
kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm
oracle linux
7
x86_64
kernel-debug
< 3.10.0-862.11.6.el7
kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-debug-devel
< 3.10.0-862.11.6.el7
kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-devel
< 3.10.0-862.11.6.el7
kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm
oracle linux
7
noarch
kernel-doc
< 3.10.0-862.11.6.el7
kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
oracle linux
7
x86_64
kernel-headers
< 3.10.0-862.11.6.el7
kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-tools
< 3.10.0-862.11.6.el7
kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm
oracle linux
7
x86_64
kernel-tools-libs
< 3.10.0-862.11.6.el7
kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm
Rows per page:
10
1-10 of 13
1
Related
openvas 27
virtuozzo 3
nessus 65
centos 2
redhat 20
ibm 9
oraclelinux 9
ubuntu 9
cve 3
cloudfoundry 2
nvd 3
osv 3
freebsd 1
fedora 2
redhatcve 4
debian 4
xen 1
freebsd_advisory 1
mageia 4
threatpost 1
lenovo 2
cisco 1
msrc 2
ubuntucve 2
cvelist 2
cert 1
f5 2
thn 1
intel 1
amazon 3
debiancve 2
veracode 4
prion 2
huawei 1
openvas
openvas
27
CentOS Update for kernel CESA-2018:2384 centos7
2018-08-15 00:00:00
Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1345)
2020-01-23 00:00:00
Ubuntu: Security Advisory (USN-3741-1)
2018-08-15 00:00:00
virtuozzo
virtuozzo
Important kernel security update: CVE-2018-3620 and other issues; new kernel 3.10.0-862.11.6.vz7.64.7; Virtuozzo 7.0 Update 8 Hotfix 1 (7.0.8-507)
2018-08-30 00:00:00
Important kernel security update: CVE-2018-3620 and other issues; new kernel 2.6.32-042stab133.1 for Virtuozzo Containers for Linux 4.7, Server Bare Metal 5.0
2018-08-20 00:00:00
Important kernel security update: CVE-2018-3620 and other issues; new kernel 2.6.32-042stab133.1; Virtuozzo 6.0 Update 12 Hotfix 30 (6.0.12-3713)
2018-08-20 00:00:00
nessus
nessus
65
RHEL 7 : kernel (RHSA-2018:2384)
2018-08-15 00:00:00
Scientific Linux Security Update : kernel on SL7.x x86_64 (20180814) (Foreshadow)
2018-08-16 00:00:00
Oracle Linux 7 : kernel (ELSA-2018-2384)
2018-08-15 00:00:00
centos
centos
kernel, perf, python security update
2018-08-15 03:59:04
kernel, perf, python security update
2018-08-15 01:59:55
redhat
redhat
20
(RHSA-2018:2395) Important: kernel-rt security and bug fix update
2018-08-14 19:27:20
(RHSA-2018:2384) Important: kernel security and bug fix update
2018-08-14 17:05:56
(RHSA-2018:2402) Important: rhvm-appliance security update
2018-08-16 05:04:33
ibm
ibm
9
Security Bulletin: Vulnerabilities in the Linux kernel affect PowerKVM
2019-02-12 15:40:01
Security Bulletin: Vyatta 5600 vRouter Software Patches - Release 1801q
2018-10-10 21:05:01
Security Bulletin: IBM QRadar SIEM is vulnerable to Using Components with Known Vulnerabilities
2018-12-03 14:30:01
oraclelinux
oraclelinux
9
kernel security and bug fix update
2018-09-26 00:00:00
kernel security and bug fix update
2018-08-14 00:00:00
Unbreakable Enterprise kernel security update
2018-09-13 00:00:00
ubuntu
ubuntu
9
Linux kernel regressions
2018-08-17 00:00:00
Linux kernel (Xenial HWE) vulnerabilities
2018-08-14 00:00:00
Linux kernel vulnerabilities
2018-08-14 00:00:00
cve
cve
CVE-2018-3690
2018-08-27 20:29:00
CVE-2017-13215
2018-01-12 23:29:01
CVE-2018-10675
2018-05-02 18:29:00
cloudfoundry
cloudfoundry
USN-3741-2: Linux kernel (Xenial HWE) vulnerabilities | Cloud Foundry
2018-08-17 00:00:00
USN-3740-2: Linux kernel (HWE) vulnerabilities | Cloud Foundry
2018-09-11 00:00:00
nvd
nvd
CVE-2018-3690
2018-08-27 20:29:00
CVE-2017-13215
2018-01-12 23:29:01
CVE-2018-10675
2018-05-02 18:29:00
osv
osv
linux-4.9 - security update
2018-08-28 00:00:00
linux - security update
2018-08-20 00:00:00
CVE-2018-10675
2018-05-02 18:29:00
freebsd
freebsd
FreeBSD -- L1 Terminal Fault (L1TF) Kernel Information Disclosure
2018-08-14 00:00:00
fedora
fedora
[SECURITY] Fedora 28 Update: kernel-headers-4.17.14-3.fc28
2018-08-16 08:08:45
[SECURITY] Fedora 27 Update: kernel-headers-4.17.14-3.fc27
2018-08-16 07:24:56
redhatcve
redhatcve
4
CVE-2018-3646
2021-01-24 22:39:20
CVE-2017-13215
2019-10-09 10:13:57
CVE-2018-10675
2019-10-26 12:49:19
debian
debian
4
[SECURITY] [DSA 4279-1] linux security update
2018-08-20 11:44:32
[SECURITY] [DSA 4279-1] linux security update
2018-08-20 11:44:32
[SECURITY] [DSA 4274-1] xen security update
2018-08-16 20:47:43
xen
xen
L1 Terminal Fault speculative side channel
2018-08-14 17:15:00
freebsd_advisory
freebsd_advisory
FreeBSD-SA-18:09.l1tf
2018-08-14 00:00:00
mageia
mageia
4
Updated kernel packages fix security vulnerabilities
2018-08-19 14:24:54
Updated microcode packages fix security vulnerabilities
2018-08-19 14:24:54
Updated kernel-tmb packages fix security vulnerabilities
2018-08-19 14:24:54
threatpost
threatpost
Intel CPUs Undermined By Fresh Speculative Execution Flaws
2018-08-14 19:24:34
lenovo
lenovo
L1 Terminal Fault Side Channel Vulnerabilities - Lenovo Support NL
2018-08-16 14:27:00
L1 Terminal Fault Side Channel Vulnerabilities - US
2018-08-16 14:27:00
cisco
cisco
CPU Side-Channel Information Disclosure Vulnerabilities: August 2018
2018-08-14 17:00:00
msrc
msrc
Analysis and mitigation of L1 Terminal Fault (L1TF)
2018-08-13 07:00:00
Analysis and mitigation of L1 Terminal Fault (L1TF)
2018-08-13 07:00:00
ubuntucve
ubuntucve
CVE-2017-13215
2018-01-12 00:00:00
CVE-2018-10675
2018-05-02 00:00:00
cvelist
cvelist
CVE-2017-13215
2018-01-12 23:00:00
CVE-2018-10675
2018-05-02 18:00:00
cert
cert
Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)
2018-08-15 00:00:00
f5
f5
K70675920 : August 2018 Intel security vulnerability announcement
2018-08-15 00:00:00
K40540405 : Linux kernel vulnerability CVE-2018-10675
2020-12-23 00:00:00
thn
thn
Foreshadow Attacks — 3 New Intel CPU Side-Channel Flaws Discovered
2018-08-15 07:40:00
intel
intel
Q3 2018 Speculative Execution Side Channel Update
2021-05-11 00:00:00
amazon
amazon
Important: kernel
2018-04-19 04:50:00
Critical: kernel
2018-08-10 22:53:00
Critical: kernel
2018-08-10 20:26:00
debiancve
debiancve
CVE-2017-13215
2018-01-12 23:29:01
CVE-2018-10675
2018-05-02 18:29:00
veracode
veracode
4
Privilege Escalation
2019-01-15 09:24:07
Denial Of Service (DoS)
2019-01-15 09:24:56
Memory Corruption
2019-05-16 03:11:34
prion
prion
Privilege escalation
2018-01-12 23:29:00
Design/Logic Flaw
2018-05-02 18:29:00
huawei
huawei
Security Advisory - CPU Side Channel Vulnerability "L1TF"
2018-08-15 00:00:00
EPSS
0.783
Percentile
98.3%
JSON
Related for ELSA-2018-2384
openvas
27
virtuozzo
3
nessus
65
centos
2
redhat
20
ibm
9
oraclelinux
9
ubuntu
9
cve
3
cloudfoundry
2
nvd
3
osv
3
freebsd
1
fedora
2
redhatcve
4
debian
4
xen
1
freebsd_advisory
1
mageia
4
threatpost
1
lenovo
2
cisco
1
msrc
2
ubuntucve
2
cvelist
2
cert
1
f5
2
thn
1
intel
1
amazon
3
debiancve
2
veracode
4
prion
2
huawei
1