Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2018-4006
History
Jan 09, 2018 - 12:00 a.m.
Vulners
/
Oraclelinux
/
Unbreakable Enterprise kernel security update
Unbreakable Enterprise kernel security update
2018-01-09
00:00:00
linux.oracle.com
71
0.975 High
EPSS
Percentile
100.0%
JSON
[4.1.12-112.14.10]
x86/ia32: save and clear registers on syscall. (Jamie Iles) [Orabug: 27355759] {CVE-2017-5754}
x86/IBRS: Save current status of MSR_IA32_SPEC_CTRL (Boris Ostrovsky) [Orabug: 27355887]
pti: Rename X86_FEATURE_KAISER to X86_FEATURE_PTI (Pavel Tatashin) [Orabug: 27352353] {CVE-2017-5754}
usb/core: usb_alloc_dev(): fix setting of ->portnum (Nicolai Stange) [Orabug: 27356522]
x86/spec_ctrl: Add missing IBRS_DISABLE (Konrad Rzeszutek Wilk)
Make use of ibrs_inuse consistent. (Jun Nakajima)
[4.1.12-112.14.8]
x86/kvm: Set IBRS on VMEXIT if guest disabled it. (Konrad Rzeszutek Wilk)
[4.1.12-112.14.7]
Re-introduce clearing of r12-15, rbp, rbx (Kris Van Hees) [Orabug: 27352353] {CVE-2017-5754}
x86: more ibrs/pti fixes (Pavel Tatashin) [Orabug: 27352353] {CVE-2017-5754}
x86/spec: Actually do the check for in_use on ENABLE_IBRS (Konrad Rzeszutek Wilk) {CVE-2017-5715}
kvm: svm: Expose the CPUID.0x80000008 ebx flag. (Konrad Rzeszutek Wilk) {CVE-2017-5715}
x86/spec_ctrl: Provide the sysfs version of the ibrs_enabled (Konrad Rzeszutek Wilk) {CVE-2017-5715}
x86: Use better #define for FEATURE_ENABLE_IBRS and 0 (Konrad Rzeszutek Wilk) {CVE-2017-5715}
x86: Instead of 0x2, 0x4, and 0x1 use #defines. (Konrad Rzeszutek Wilk) {CVE-2017-5715}
kpti: Disable when running under Xen PV (Konrad Rzeszutek Wilk) [Orabug: 27352353] {CVE-2017-5754}
x86: Don’t ENABLE_IBRS in nmi when we are still running on user cr3 (Konrad Rzeszutek Wilk) {CVE-2017-5715}
x86/enter: Use IBRS on syscall and interrupts - fix ia32 path (Konrad Rzeszutek Wilk) {CVE-2017-5715}
x86: Fix spectre/kpti integration (Konrad Rzeszutek Wilk) [Orabug: 27352353] {CVE-2017-5754}
PTI: unbreak EFI old_memmap (Jiri Kosina) [Orabug: 27352353] {CVE-2017-5754}
KAISER KABI tweaks. (Martin K. Petersen) [Orabug: 27352353] {CVE-2017-5754}
x86/ldt: fix crash in ldt freeing. (Jamie Iles) [Orabug: 27352353] {CVE-2017-5754}
x86/entry: Define ‘cpu_current_top_of_stack’ for 64-bit code (Denys Vlasenko) [Orabug: 27352353] {CVE-2017-5754}
x86/entry: Remove unused ‘kernel_stack’ per-cpu variable (Denys Vlasenko) [Orabug: 27352353] {CVE-2017-5754}
x86/entry: Stop using PER_CPU_VAR(kernel_stack) (Denys Vlasenko) [Orabug: 27352353] {CVE-2017-5754}
kaiser: Set _PAGE_NX only if supported (Guenter Roeck) [Orabug: 27352353] {CVE-2017-5754}
x86/vdso: Get pvclock data from the vvar VMA instead of the fixmap (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
KPTI: Report when enabled (Kees Cook) [Orabug: 27352353] {CVE-2017-5754}
KPTI: Rename to PAGE_TABLE_ISOLATION (Kees Cook) [Orabug: 27352353] {CVE-2017-5754}
x86/kaiser: Move feature detection up (Borislav Petkov) [Orabug: 27352353] {CVE-2017-5754}
x86/kaiser: Reenable PARAVIRT (Borislav Petkov) [Orabug: 27352353] {CVE-2017-5754}
x86/paravirt: Dont patch flush_tlb_single (Thomas Gleixner) [Orabug: 27352353] {CVE-2017-5754}
kaiser: kaiser_flush_tlb_on_return_to_user() check PCID (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: asm/tlbflush.h handle noPGE at lower level (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: drop is_atomic arg to kaiser_pagetable_walk() (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
x86/kaiser: Check boottime cmdline params (Borislav Petkov) [Orabug: 27352353] {CVE-2017-5754}
x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling (Borislav Petkov) [Orabug: 27352353] {CVE-2017-5754}
kaiser: add ‘nokaiser’ boot option, using ALTERNATIVE (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: fix unlikely error in alloc_ldt_struct() (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: paranoid_entry pass cr3 need to paranoid_exit (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: PCID 0 for kernel and 128 for user (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: enhanced by kernel and user PCIDs (Dave Hansen) [Orabug: 27352353] {CVE-2017-5754}
kaiser: vmstat show NR_KAISERTABLE as nr_overhead (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: delete KAISER_REAL_SWITCH option (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: cleanups while trying for gold link (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: kaiser_remove_mapping() move along the pgd (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: tidied up kaiser_add/remove_mapping slightly (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: tidied up asm/kaiser.h somewhat (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: ENOMEM if kaiser_pagetable_walk() NULL (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: fix perf crashes (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: KAISER depends on SMP (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: fix build and FIXME in alloc_ldt_struct() (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: do not set _PAGE_NX on pgd_none (Hugh Dickins) [Orabug: 27352353] {CVE-2017-5754}
kaiser: merged update (Dave Hansen) [Orabug: 27352353] {CVE-2017-5754}
KAISER: Kernel Address Isolation (Richard Fellner) [Orabug: 27352353] {CVE-2017-5754}
x86/boot: Add early cmdline parsing for options with arguments (Tom Lendacky) [Orabug: 27352353] {CVE-2017-5754}
x86/mm/64: Fix reboot interaction with CR4.PCIDE (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Enable CR4.PCIDE on supported systems (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Add the ‘nopcid’ boot option to turn off PCID (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Disable PCID on 32-bit kernels (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Make flush_tlb_mm_range() more predictable (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Remove flush_tlb() and flush_tlb_current_task() (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/irq: Do not substract irq_tlb_count from irq_call_count (Aaron Lu) [Orabug: 27352353] {CVE-2017-5754}
sched/core: Idle_task_exit() shouldn’t use switch_mm_irqs_off() (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
ARM: Hide finish_arch_post_lock_switch() from modules (Steven Rostedt) [Orabug: 27352353] {CVE-2017-5754}
x86/mm, sched/core: Turn off IRQs in switch_mm() (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm, sched/core: Uninline switch_mm() (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Build arch/x86/mm/tlb.c even on !SMP (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
sched/core: Add switch_mm_irqs_off() and use it in the scheduler (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
mm/mmu_context, sched/core: Fix mmu_context.h assumption (Ingo Molnar) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: If INVPCID is available, use it to flush global mappings (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Add a ‘noinvpcid’ boot option to turn off INVPCID (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Fix INVPCID asm constraint (Borislav Petkov) [Orabug: 27352353] {CVE-2017-5754}
x86/mm: Add INVPCID helpers (Andy Lutomirski) [Orabug: 27352353] {CVE-2017-5754}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
6
src
kernel-uek
< 4.1.12-112.14.10.el6uek
kernel-uek-4.1.12-112.14.10.el6uek.src.rpm
oracle linux
6
x86_64
kernel-uek
< 4.1.12-112.14.10.el6uek
kernel-uek-4.1.12-112.14.10.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-debug
< 4.1.12-112.14.10.el6uek
kernel-uek-debug-4.1.12-112.14.10.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-debug-devel
< 4.1.12-112.14.10.el6uek
kernel-uek-debug-devel-4.1.12-112.14.10.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-devel
< 4.1.12-112.14.10.el6uek
kernel-uek-devel-4.1.12-112.14.10.el6uek.x86_64.rpm
oracle linux
6
noarch
kernel-uek-doc
< 4.1.12-112.14.10.el6uek
kernel-uek-doc-4.1.12-112.14.10.el6uek.noarch.rpm
oracle linux
6
noarch
kernel-uek-firmware
< 4.1.12-112.14.10.el6uek
kernel-uek-firmware-4.1.12-112.14.10.el6uek.noarch.rpm
oracle linux
7
src
kernel-uek
< 4.1.12-112.14.10.el7uek
kernel-uek-4.1.12-112.14.10.el7uek.src.rpm
oracle linux
7
x86_64
kernel-uek
< 4.1.12-112.14.10.el7uek
kernel-uek-4.1.12-112.14.10.el7uek.x86_64.rpm
oracle linux
7
x86_64
kernel-uek-debug
< 4.1.12-112.14.10.el7uek
kernel-uek-debug-4.1.12-112.14.10.el7uek.x86_64.rpm
Rows per page:
10
1-10 of 14
1
Related
freebsd_advisory 1
slackware 1
openvas 27
kitploit 2
mageia 3
nessus 60
freebsd 1
amazon 2
oraclelinux 2
redhat 21
redhatcve 1
huawei 2
ibm 25
suse 5
nvidia 7
seebug 1
virtuozzo 4
vmware 2
lenovo 2
f5 1
symantec 3
qualysblog 6
ubuntu 6
arista 1
threatpost 1
malwarebytes 2
cloudfoundry 1
paloalto 1
centos 2
cisco 1
thn 2
securelist 1
googleprojectzero 1
veeam 1
freebsd_advisory
freebsd_advisory
FreeBSD-SA-18:03.speculative_execution
2018-03-14 00:00:00
slackware
slackware
[slackware-security] kernel
2018-01-16 06:32:33
openvas
openvas
27
Mageia: Security Advisory (MGASA-2018-0134)
2022-01-28 00:00:00
Slackware: Security Advisory (SSA:2018-016-01)
2022-04-21 00:00:00
Ubuntu: Security Advisory (USN-3540-1)
2018-01-23 00:00:00
kitploit
kitploit
In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors
2018-01-07 20:04:00
Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux
2018-01-08 12:43:00
mageia
mageia
Updated kernel packages fix security vulnerabilities
2018-02-23 20:14:35
Updated nvidia-current packages mitigates security issues
2018-01-13 17:28:36
Updated kernel packages fix security vulnerabilities
2018-03-19 15:13:14
nessus
nessus
60
Amazon Linux 2 : kernel (ALAS-2018-939) (Meltdown) (Spectre)
2018-04-18 00:00:00
Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4006)
2018-01-12 00:00:00
Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4011) (Meltdown) (Spectre)
2018-01-15 00:00:00
freebsd
freebsd
FreeBSD -- Speculative Execution Vulnerabilities
2018-03-14 00:00:00
amazon
amazon
Critical: kernel
2018-01-03 19:27:00
Critical: kernel
2018-01-11 21:05:00
oraclelinux
oraclelinux
Unbreakable Enterprise kernel security update
2018-01-12 00:00:00
Unbreakable Enterprise kernel security update
2018-01-19 00:00:00
redhat
redhat
21
(RHSA-2018:1129) Important: kernel security and bug fix update
2018-04-17 14:32:29
(RHSA-2018:0089) Important: Red Hat CloudForms 4.1 security update
2018-01-15 21:33:19
(RHSA-2018:0091) Important: Red Hat CloudForms 4.5 security update
2018-01-15 21:33:25
redhatcve
redhatcve
CVE-2017-5715
2021-07-20 18:54:09
huawei
huawei
Security Advisory - CPU Vulnerabilities Meltdown and Spectre
2018-06-06 00:00:00
Security Advisory - CPU Vulnerabilities 'Meltdown' and 'Spectre'
2018-01-06 00:00:00
ibm
ibm
25
Security Bulletin: Aspera Products and the Meltdown and Spectre vulnerabilities (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)
2018-12-08 04:55:34
Security Bulletin: IBM Spectrum Protect Plus has released instructions for obtaining an update in response to the vulnerabilities known as Spectre and Meltdown
2018-06-17 15:48:44
Security Bulletin: PowerKVM has released updates in response to the vulnerabilities known as Spectre and Meltdown.
2018-06-18 01:41:07
suse
suse
5
Security update for the Linux Kernel (important)
2018-01-16 21:08:59
Security update for the Linux Kernel (important)
2018-01-11 18:10:26
Security update for the Linux Kernel (important)
2018-01-16 21:08:19
nvidia
nvidia
7
Security Bulletin: NVIDIA Jetson TX1, Jetson TK1, and Tegra K1 L4T Security Updates for CPU Speculative Side Channel Vulnerabilities
2018-01-05 00:00:00
Security Bulletin: NVIDIA GeForce Experience (GFE) Security Updates for CPU Speculative Side Channel Vulnerabilities
2018-01-09 00:00:00
Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
2018-01-04 00:00:00
seebug
seebug
Reading privileged memory with a side-channel (Meltdown & Spectre)
2018-01-04 00:00:00
virtuozzo
virtuozzo
4
Important kernel security update: Fixes for Meltdown and Spectre exploits; new kernel 3.10.0-693.11.6.vz7.40.4, Virtuozzo 7.0 Update 6 Hotfix 3 (7.0.6-710)
2018-01-08 00:00:00
Important kernel security update: Fixes for Meltdown and Spectre exploits; new kernel 2.6.32-042stab127.2, Virtuozzo 6.0 Update 12 Hotfix 20 (6.0.12-3690)
2018-01-06 00:00:00
Important product update: Fixes for Meltdown and Spectre exploits in virtual machines; Virtuozzo 6.0 Update 12 Hotfix 21 (6.0.12-3698)
2018-02-01 00:00:00
vmware
vmware
VMware Virtual Appliance updates address side-channel analysis due to speculative execution
2018-02-08 00:00:00
VMware Virtual Appliance updates address side-channel analysis due to speculative execution
2018-02-08 00:00:00
lenovo
lenovo
Reading Privileged Memory with a Side Channel - Lenovo Support US
2018-10-24 12:22:52
Reading Privileged Memory with a Side Channel - US
2018-10-24 12:22:52
f5
f5
Side-channel processor vulnerabilities CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754
2018-01-04 04:46:00
symantec
symantec
Multiple CPU Hardware CVE-2017-5753 Information Disclosure Vulnerability
2018-01-03 00:00:00
SA161: Local Information Disclosure Due to Meltdown and Spectre Attacks
2018-01-08 08:00:00
Multiple CPU Hardware CVE-2017-5754 Information Disclosure Vulnerability
2018-01-03 00:00:00
qualysblog
qualysblog
6
Meltdown/Spectre and Qualys Cloud Platform
2018-01-09 02:36:19
Apple in the InfoSec Spotlight, as GitHub Falls Prey to Amplified DDoS Attack
2018-03-02 14:48:53
Processor Vulnerabilities – Meltdown and Spectre
2018-01-04 02:17:43
ubuntu
ubuntu
6
Linux kernel vulnerabilities
2018-01-23 00:00:00
Linux kernel (HWE) vulnerabilities
2018-03-15 00:00:00
Linux kernel (Xenial HWE) vulnerabilities
2018-01-23 00:00:00
arista
arista
Security Advisory 0031
2018-01-03 00:00:00
threatpost
threatpost
Experts Weigh In On Spectre Patch Challenges
2018-01-07 23:21:34
malwarebytes
malwarebytes
Meltdown and Spectre fallout: patching problems persist
2018-01-11 14:00:00
Meltdown and Spectre: what you need to know
2018-01-04 15:53:24
cloudfoundry
cloudfoundry
USN-3540-2: Linux kernel (Xenial HWE) vulnerabilities | Cloud Foundry
2018-01-23 00:00:00
paloalto
paloalto
Information about Meltdown and Spectre findings
2018-01-04 00:00:00
centos
centos
kernel, perf, python security update
2018-01-04 19:46:26
kernel, perf, python security update
2018-01-04 11:36:27
cisco
cisco
CPU Side-Channel Information Disclosure Vulnerabilities
2018-01-04 22:20:00
thn
thn
[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks
2018-01-04 21:18:00
Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors
2018-01-03 19:34:00
securelist
securelist
IT threat evolution Q1 2018
2018-05-14 10:00:08
googleprojectzero
googleprojectzero
Reading privileged memory with a side-channel
2018-01-03 00:00:00
veeam
veeam
Meltdown and Spectre vulnerabilities
2018-01-09 00:00:00
0.975 High
EPSS
Percentile
100.0%
JSON
Related for ELSA-2018-4006
freebsd_advisory
1
slackware
1
openvas
27
kitploit
2
mageia
3
nessus
60
freebsd
1
amazon
2
oraclelinux
2
redhat
21
redhatcve
1
huawei
2
ibm
25
suse
5
nvidia
7
seebug
1
virtuozzo
4
vmware
2
lenovo
2
f5
1
symantec
3
qualysblog
6
ubuntu
6
arista
1
threatpost
1
malwarebytes
2
cloudfoundry
1
paloalto
1
centos
2
cisco
1
thn
2
securelist
1
googleprojectzero
1
veeam
1