Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2018-4110
History
May 15, 2018 - 12:00 a.m.
Vulners
/
Oraclelinux
/
Unbreakable Enterprise kernel security update
Unbreakable Enterprise kernel security update
2018-05-15
00:00:00
linux.oracle.com
64
0.976 High
EPSS
Percentile
100.0%
JSON
[2.6.39-400.299.1]
ext4/jbd2: dont wait (forever) for stale tid caused by wraparound (Theodore Tso) [Orabug: 26424268]
jbd2: dont wake kjournald unnecessarily (Eric Sandeen) [Orabug: 26424268]
ext4: fix data corruption in inodes with journalled data (Jan Kara) [Orabug: 26424268]
media: imon: Fix null-ptr-deref in imon_probe (Arvind Yadav) [Orabug: 27208383] {CVE-2017-16537}
Input: gtco - fix potential out-of-bound access (Dmitry Torokhov) [Orabug: 27215095] {CVE-2017-16643}
RDS: IB: Fix null pointer issue (Guanglei Li) [Orabug: 27241654]
usb: usbtest: fix NULL pointer dereference (Alan Stern) [Orabug: 27602321] {CVE-2017-16532}
vfs,proc: guarantee unique inodes in /proc (Linus Torvalds) [Orabug: 27637293]
vfs: dont chain pipe/anon/socket on superblock s_inodes list (Eric Dumazet) [Orabug: 27637293]
fuse: fix deadlock caused by wrong locking order (Junxiao Bi) [Orabug: 27719848]
jbd: dont wait (forever) for stale tid caused by wraparound (Jan Kara) [Orabug: 27734012]
netfilter: ebtables: CONFIG_COMPAT: dont trust userland offsets (Florian Westphal) [Orabug: 27774010] {CVE-2018-1068}
x86/spec: set_ibrs[ibpb]_disabled() should disable ibrs[ibpb]_admin_disabled (Krish Sadhukhan) [Orabug: 27788624]
x86/spec: Fix wrong output from sysfs (Krish Sadhukhan) [Orabug: 27795350]
x86/spec: Fix spectre_v1 bug and mitigation indicators (John Haxby) [Orabug: 27811437]
ext4: add validity checks for bitmap block numbers (Theodore Tso) [Orabug: 27854370] {CVE-2018-1093} {CVE-2018-1093}
x86/microcode: probe CPU features on microcode update (Ankur Arora) [Orabug: 27878228]
x86/microcode: microcode_write() should not reference boot_cpu_data (Ankur Arora) [Orabug: 27878228]
x86/cpufeatures: use cpu_data in scan_spec_ctrl_features and rescan_spec_ctrl_features (Ankur Arora) [Orabug: 27878228]
USB: core: prevent malicious bNumInterfaces overflow (Alan Stern) [Orabug: 27898064] {CVE-2017-17558}
retpoline: microcode incorrectly reported as broken during early boot (Chuck Anderson) [Orabug: 27915293]
x86/spec: scan_spec_ctrl_feature should be executed only for cpu_index 0 (Krish Sadhukhan) [Orabug: 27915355]
RDS: Heap OOB write in rds_message_alloc_sgs() (Mohamed Ghannam) [Orabug: 27934081] {CVE-2018-5332}
xfs: set format back to extents if xfs_bmap_extents_to_btree (Eric Sandeen) [Orabug: 27989490] {CVE-2018-10323}
net/rds: Fix endless RNR situation (Hakon Bugge) [Orabug: 27645402]
x86/entry/64: Dont use IST entry for #BP stack (Andy Lutomirski) {CVE-2018-8897}
perf/hwbp: Simplify the perf-hwbp code, fix documentation (Linus Torvalds) [Orabug: 27947612] {CVE-2018-100199}
xen-netfront: fix rx stall when req_prod_pvt goes back to more than zero again (Dongli Zhang) [Orabug: 25053376]
x86/IBRS: Remove support for IBRS_ENABLED_USER mode (Boris Ostrovsky) [Orabug: 27430615]
x86/microcode/intel: Disable late loading on model 79 (Borislav Petkov) [Orabug: 27343579]
ALSA: usb-audio: Kill stray URB at exiting (Takashi Iwai) [Orabug: 27148283] {CVE-2017-16527}
uwb: properly check kthread_run return value (Andrey Konovalov) [Orabug: 27206900] {CVE-2017-16526}
HID: usbhid: fix out-of-bounds bug (Jaejoong Kim) [Orabug: 27207935] {CVE-2017-16533}
cx231xx-cards: fix NULL-deref on missing association descriptor (Johan Hovold) [Orabug: 27208080] {CVE-2017-16536}
net: cdc_ether: fix divide by 0 on bad descriptors (Bjorn Mork) [Orabug: 27215206] {CVE-2017-16649}
Bluetooth: bnep: bnep_add_connection() should verify that its dealing with l2cap socket (Al Viro) [Orabug: 27344787] {CVE-2017-15868}
Bluetooth: hidp: verify l2cap sockets (David Herrmann) [Orabug: 27344787] {CVE-2017-15868}
ALSA: pcm: prevent UAF in snd_pcm_info (Robb Glasser) [Orabug: 27344840] {CVE-2017-0861} {CVE-2017-0861}
Addendum: x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes (David Woodhouse) [Orabug: 27516441]
x86/cpufeature: Add X86_FEATURE_IA32_ARCH_CAPS and X86_FEATURE_IBRS_ATT (David Woodhouse) [Orabug: 27649498] {CVE-2017-5715}
x86/cpufeatures: Clean up Spectre v2 related CPUID flags (David Woodhouse) [Orabug: 27649510] {CVE-2017-5715}
x86/spectre: Now that we expose ‘stbibp’ make sure it is correct. (Konrad Rzeszutek Wilk) [Orabug: 27649631] {CVE-2017-5715}
x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (KarimAllah Ahmed) [Orabug: 27649640] {CVE-2017-5715}
x86: Add STIBP feature enumeration (David Woodhouse) [Orabug: 27649693] {CVE-2017-5715}
x86/cpu/AMD: Add speculative control support for AMD (Tom Lendacky) [Orabug: 27649706] {CVE-2017-5715}
x86/spectre_v2: Dont spam the console with these: (Konrad Rzeszutek Wilk) [Orabug: 27649723] {CVE-2017-5715}
x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes (Darren Kenny) [Orabug: 27600848]
Revert ‘x86/spec_ctrl: Add ‘nolfence’ knob to disable fallback for spectre_v2 mitigation’ (Konrad Rzeszutek Wilk) [Orabug: 27601773]
x86/syscall: run syscall exit code with extra registers cleared (Alexandre Chartre) [Orabug: 27501176]
x86/syscall: run syscall-specific code with extra registers cleared (Alexandre Chartre) [Orabug: 27501176]
x86/syscall: run syscall entry code with extra registers cleared (Alexandre Chartre) [Orabug: 27501176]
x86/spectre: Drop the warning about ibrs being obsolete (Konrad Rzeszutek Wilk) [Orabug: 27518974]
x86: Include linux/device.h in bugs_64.c (Boris Ostrovsky) [Orabug: 27519044]
x86: fix mitigation details of UEK2 spectre v1 (Konrad Rzeszutek Wilk) [Orabug: 27509909]
x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes (David Woodhouse) [Orabug: 27516441] {CVE-2017-5715}
x86, intel: Output microcode revision in /proc/cpuinfo (Andi Kleen) [Orabug: 27516441]
x86: intel-family.h: Add GEMINI_LAKE SOC (Len Brown) [Orabug: 27516441]
x86/cpu/intel: Introduce macros for Intel family numbers (Dave Hansen) [Orabug: 27516441]
x86/mitigation/spectre_v2: Add reporting of ‘lfence’ (Konrad Rzeszutek Wilk) [Orabug: 27525958]
x86/spec: Add ‘lfence_enabled’ in sysfs (Konrad Rzeszutek Wilk) [Orabug: 27525954]
x86/spec_ctrl: Add ‘nolfence’ knob to disable fallback for spectre_v2 mitigation (Konrad Rzeszutek Wilk) [Orabug: 27525923]
x86/spec: Also print IBRS if IBPB is disabled (Konrad Rzeszutek Wilk) [Orabug: 27519083]
x86: Use Indirect Branch Prediction Barrier in context switch (Tim Chen) [Orabug: 27516378]
ext4: limit group search loop for non-extent files (Lachlan McIlroy) [Orabug: 17488415]
ext4: fixup 64-bit divides in 3.0-stable backport of upstream fix (Todd Poynor) [Orabug: 17488415]
ext4: use atomic64_t for the per-flexbg free_clusters count (Theodore Tso) [Orabug: 17488415]
ext4: init pagevec in ext4_da_block_invalidatepages (Eric Sandeen) [Orabug: 17488415]
ext4: do not try to write superblock on ro remount w/o journal (Michael Tokarev) [Orabug: 17488415]
xen-netback: fix grant_copy_op array size (Niranjan Patil) [Orabug: 25653941]
xen-netback: explicitly check max_slots_needed against meta_prod counter (Niranjan Patil) [Orabug: 25653941]
xen-netback: Fix handling of skbs requiring too many slots (Zoltan Kiss) [Orabug: 25653941]
xen-netback: worse-case estimate in xenvif_rx_action is underestimating (Paul Durrant) [Orabug: 25653941]
xen-netback: Add worse-case estimates of max_slots_needed in netbk_rx_action (Niranjan Patil) [Orabug: 25653941]
KEYS: Remove key_type::match in favour of overriding default by match_preparse (Tim Tianyang Chen) [Orabug: 25757946] {CVE-2017-6951}
xen/mmu: Call xen_cleanhighmap() with 4MB aligned for page tables mapping (Zhenzhong Duan) [Orabug: 26737475]
tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0 (Wei Wang) [Orabug: 26813391] {CVE-2017-14106}
rxrpc: Fix several cases where a padded len isnt checked in ticket decode (David Howells) [Orabug: 26880520] {CVE-2017-7482} {CVE-2017-7482}
ocfs2: fstrim: Fix start offset of first cluster group during fstrim (Ashish Samant) [Orabug: 27099836]
Check validity of cl_rpcclient in nfs_server_list_show (Malahal Naineni) [Orabug: 27112186]
USB: serial: console: fix use-after-free after failed setup (Johan Hovold) [Orabug: 27206839] {CVE-2017-16525}
ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor (Takashi Iwai) [Orabug: 27206934] {CVE-2017-16529}
USB: fix out-of-bounds in usb_set_configuration (Greg Kroah-Hartman) [Orabug: 27207243] {CVE-2017-16531}
dccp: CVE-2017-8824: use-after-free in DCCP code (Mohamed Ghannam) [Orabug: 27290308] {CVE-2017-8824}
x86: Use PRED_CMD MSR when ibpb is enabled (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/spec: Dont print the Missing arguments for option spectre_v2 (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86: Move ENABLE_IBRS in the interrupt macro (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
Add set_ibrs_disabled and set_ibpb_disabled (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/boot: Add early cmdline parsing for options with arguments (Tom Lendacky) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86, boot: Carve out early cmdline parsing function (Borislav Petkov) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86: Fix kABI build breakage (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86: Add command-line options ‘spectre_v2’ and ‘nospectre_v2’ (Kanth Ghatraju) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/mm: Set IBPB upon context switch (Brian Maly) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86: Display correct settings for the SPECTRE_V2 bug (Kanth Ghatraju) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
Set CONFIG_GENERIC_CPU_VULNERABILITIES flag (Kanth Ghatraju) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/cpu: Implement CPU vulnerabilites sysfs functions (Thomas Gleixner) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
sysfs/cpu: Fix typos in vulnerability documentation (David Woodhouse) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
sysfs/cpu: Add vulnerability folder (Thomas Gleixner) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86, cpu: Expand cpufeature facility to include cpu bugs (Borislav Petkov) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (David Woodhouse) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/cpufeatures: Add X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/spec: STUFF_RSB
before
ENABLE_IBRS (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86: Move STUFF_RSB in to the idt macro (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/IBRS/IBPB: Set sysctl_ibrs/ibpb_enabled properly (Boris Ostrovsky) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/IBRS: Make sure we restore MSR_IA32_SPEC_CTRL to a valid value (Boris Ostrovsky) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/spec_ctrl: Add missing ‘lfence’ when IBRS is not supported (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/ia32: Move STUFF_RSB And ENABLE_IBRS (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (Tim Chen) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86: Use IBRS for firmware update path (David Woodhouse) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/spec_ctrl: Disable if running as Xen PV guest (Konrad Rzeszutek Wilk) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/microcode: Recheck IBRS features on microcode reload (Tim Chen) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/idle: Disable IBRS entering idle and enable it on wakeup (Tim Chen) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature (Tim Chen) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/enter: Use IBRS on syscall and interrupts (Tim Chen) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/enter: MACROS to set/clear IBRS and set IBPB (Tim Chen) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86/feature: Detect the x86 IBRS feature to control Speculation (Tim Chen) [Orabug: 27369777] {CVE-2017-5715} {CVE-2017-5753}
x86: fix build breakage (Brian Maly) [Orabug: 27346425] {CVE-2017-5753}
kaiser: rename X86_FEATURE_KAISER to X86_FEATURE_PTI to match upstream (Mike Kravetz) {CVE-2017-5754}
x86/kaiser: Check boottime cmdline params (Mike Kravetz) [Orabug: 27333761] {CVE-2017-5754}
x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling (Borislav Petkov) [Orabug: 27333761] {CVE-2017-5754}
KPTI: Report when enabled (Mike Kravetz) [Orabug: 27333761] {CVE-2017-5754}
PTI: unbreak EFI old_memmap (Jiri Kosina) [Orabug: 27333761] [Orabug: 27333760] {CVE-2017-5754}
kaiser: Set _PAGE_NX only if supported (Guenter Roeck) [Orabug: 27333761] [Orabug: 27333760] {CVE-2017-5754}
KPTI: Rename to PAGE_TABLE_ISOLATION (Kees Cook) [Orabug: 27333761] {CVE-2017-5754}
kaiser: kaiser_flush_tlb_on_return_to_user() check PCID (Hugh Dickins) [Orabug: 27333761] {CVE-2017-5754}
kaiser: asm/tlbflush.h handle noPGE at lower level (Hugh Dickins) [Orabug: 27333761] {CVE-2017-5754}
kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush (Hugh Dickins) [Orabug: 27333761] {CVE-2017-5754}
x86/alternatives: add asm ALTERNATIVE macro (Mike Kravetz) [Orabug: 27333761] {CVE-2017-5754}
x86/kaiser: Reenable PARAVIRT, dynamically disable KAISER if PARAVIRT (Borislav Petkov) [Orabug: 27333761] {CVE-2017-5754}
kaiser: add ‘nokaiser’ boot option, using ALTERNATIVE (Hugh Dickins) [Orabug: 27333761] {CVE-2017-5754}
x86-32: Fix boot with CONFIG_X86_INVD_BUG (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
kaiser: alloc_ldt_struct() use get_zeroed_page() (Hugh Dickins) [Orabug: 27333761] {CVE-2017-5754}
kaiser: user_map __kprobes_text too (Hugh Dickins) [Orabug: 27333761] {CVE-2017-5754}
x86/mm/kaiser: re-enable vsyscalls (Andrea Arcangeli) [Orabug: 27333761] {CVE-2017-5754}
KAISER: Kernel Address Isolation (Hugh Dickins) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: fix bad backport to disable PCID on Xen (Borislav Petkov) [Orabug: 27333761] {CVE-2017-5754}
x86/mm/64: Fix reboot interaction with CR4.PCIDE (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Enable CR4.PCIDE on supported systems (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Add the ‘nopcid’ boot option to turn off PCID (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Disable PCID on 32-bit kernels (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
sched/core: Idle_task_exit() shouldnt use switch_mm_irqs_off() (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm, sched/core: Turn off IRQs in switch_mm() (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm, sched/core: Uninline switch_mm() (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Build arch/x86/mm/tlb.c even on !SMP (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
sched/core: Add switch_mm_irqs_off() and use it in the scheduler (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
mm/mmu_context, sched/core: Fix mmu_context.h assumption (Ingo Molnar) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: If INVPCID is available, use it to flush global mappings (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Add a ‘noinvpcid’ boot option to turn off INVPCID (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Fix INVPCID asm constraint (Borislav Petkov) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Add INVPCID helpers (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86, cpufeature: Add CPU features from Intel document 319433-012A (H. Peter Anvin) [Orabug: 27333761] {CVE-2017-5754}
x86/paravirt: Dont patch flush_tlb_single (Thomas Gleixner) [Orabug: 27333761] {CVE-2017-5754}
x86-64: Map the HPET NX (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754}
x86/ldt: Make modify_ldt synchronous (Andy Lutomirski) [Orabug: 27333761] {CVE-2017-5754} {CVE-2015-5157}
x86, cpu: Add cpufeature flag for PCIDs (Arun Thomas) [Orabug: 27333761] {CVE-2017-5754}
x86/mm: Disable preemption during CR3 read+write (Sebastian Andrzej Siewior) [Orabug: 27333761] {CVE-2017-5754}
locking/barriers: fix compile issue (Brian Maly) [Orabug: 27346425] {CVE-2017-5753}
x86: Add another set of MSR accessor functions (Borislav Petkov) [Orabug: 27346425] {CVE-2017-5753}
udf: prevent speculative execution (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
fs: prevent speculative execution (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
qla2xxx: prevent speculative execution (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
p54: prevent speculative execution (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
carl9170: prevent speculative execution (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
uvcvideo: prevent speculative execution (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
locking/barriers: introduce new observable speculation barrier (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
x86/cpu/AMD: Make the LFENCE instruction serialized (Elena Reshetova) [Orabug: 27346425] {CVE-2017-5753}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
5
src
kernel-uek
< 2.6.39-400.299.1.el5uek
kernel-uek-2.6.39-400.299.1.el5uek.src.rpm
oracle linux
5
i686
kernel-uek
< 2.6.39-400.299.1.el5uek
kernel-uek-2.6.39-400.299.1.el5uek.i686.rpm
oracle linux
5
i686
kernel-uek-debug
< 2.6.39-400.299.1.el5uek
kernel-uek-debug-2.6.39-400.299.1.el5uek.i686.rpm
oracle linux
5
i686
kernel-uek-debug-devel
< 2.6.39-400.299.1.el5uek
kernel-uek-debug-devel-2.6.39-400.299.1.el5uek.i686.rpm
oracle linux
5
i686
kernel-uek-devel
< 2.6.39-400.299.1.el5uek
kernel-uek-devel-2.6.39-400.299.1.el5uek.i686.rpm
oracle linux
5
noarch
kernel-uek-doc
< 2.6.39-400.299.1.el5uek
kernel-uek-doc-2.6.39-400.299.1.el5uek.noarch.rpm
oracle linux
5
noarch
kernel-uek-firmware
< 2.6.39-400.299.1.el5uek
kernel-uek-firmware-2.6.39-400.299.1.el5uek.noarch.rpm
oracle linux
5
src
kernel-uek
< 2.6.39-400.299.1.el5uek
kernel-uek-2.6.39-400.299.1.el5uek.src.rpm
oracle linux
5
x86_64
kernel-uek
< 2.6.39-400.299.1.el5uek
kernel-uek-2.6.39-400.299.1.el5uek.x86_64.rpm
oracle linux
5
x86_64
kernel-uek-debug
< 2.6.39-400.299.1.el5uek
kernel-uek-debug-2.6.39-400.299.1.el5uek.x86_64.rpm
Rows per page:
10
1-10 of 28
1
Related
nessus 62
oraclelinux 8
openvas 29
osv 1
debian 1
suse 6
ubuntu 9
redhatcve 1
mageia 1
huawei 2
ibm 24
nvidia 7
redhat 20
seebug 1
thn 1
securelist 1
virtuozzo 4
symantec 2
vmware 1
lenovo 2
f5 1
qualysblog 4
arista 1
threatpost 1
malwarebytes 1
cloudfoundry 2
paloalto 1
kitploit 1
centos 2
cisco 1
googleprojectzero 1
nessus
nessus
62
Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4110)
2018-05-17 00:00:00
Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4109)
2018-05-16 00:00:00
OracleVM 3.3 : Unbreakable / etc (OVMSA-2018-0041) (Spectre)
2018-05-10 00:00:00
oraclelinux
oraclelinux
8
Unbreakable Enterprise kernel security update
2018-05-15 00:00:00
Unbreakable Enterprise kernel security update
2018-05-01 00:00:00
Unbreakable Enterprise kernel security update
2018-02-26 00:00:00
openvas
openvas
29
Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2017-1291)
2020-01-23 00:00:00
Debian: Security Advisory (DLA-1200-1)
2023-03-08 00:00:00
Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2017-1292)
2020-01-23 00:00:00
osv
osv
linux - security update
2017-12-09 00:00:00
debian
debian
[SECURITY] [DLA 1200-1] linux security update
2017-12-10 22:07:05
suse
suse
6
Security update for the Linux Kernel (important)
2018-01-23 18:09:44
Security update for the Linux Kernel (important)
2017-12-08 18:11:43
Security update for the Linux Kernel (important)
2018-01-16 21:08:59
ubuntu
ubuntu
9
Linux kernel (AWS) vulnerabilities
2017-11-21 00:00:00
Linux kernel (Xenial HWE) vulnerabilities
2017-11-21 00:00:00
Linux kernel vulnerabilities
2018-03-15 00:00:00
redhatcve
redhatcve
CVE-2017-5715
2021-07-20 18:54:09
mageia
mageia
Updated nvidia-current packages mitigates security issues
2018-01-13 17:28:36
huawei
huawei
Security Advisory - CPU Vulnerabilities Meltdown and Spectre
2018-06-06 00:00:00
Security Advisory - CPU Vulnerabilities 'Meltdown' and 'Spectre'
2018-01-06 00:00:00
ibm
ibm
24
Security Bulletin: Aspera Products and the Meltdown and Spectre vulnerabilities (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)
2018-12-08 04:55:34
Security Bulletin: IBM Spectrum Protect Plus has released instructions for obtaining an update in response to the vulnerabilities known as Spectre and Meltdown
2018-06-17 15:48:44
Security Bulletin: PowerKVM has released updates in response to the vulnerabilities known as Spectre and Meltdown.
2018-06-18 01:41:07
nvidia
nvidia
7
Security Bulletin: NVIDIA Jetson TX1, Jetson TK1, and Tegra K1 L4T Security Updates for CPU Speculative Side Channel Vulnerabilities
2018-01-05 00:00:00
Security Bulletin: NVIDIA Jetson TX2 L4T Security Updates for CPU Speculative Side Channel Vulnerabilities
2018-01-05 00:00:00
Security Notice: CPU Speculative Side Channel Vulnerabilities
2018-01-03 00:00:00
redhat
redhat
20
(RHSA-2018:0089) Important: Red Hat CloudForms 4.1 security update
2018-01-15 21:33:19
(RHSA-2018:0091) Important: Red Hat CloudForms 4.5 security update
2018-01-15 21:33:25
(RHSA-2018:0009) Important: kernel security update
2018-01-03 22:33:10
seebug
seebug
Reading privileged memory with a side-channel (Meltdown & Spectre)
2018-01-04 00:00:00
thn
thn
[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks
2018-01-04 21:18:00
securelist
securelist
IT threat evolution Q1 2018
2018-05-14 10:00:08
virtuozzo
virtuozzo
4
Important product update: Fixes for Meltdown and Spectre exploits in virtual machines; Virtuozzo 6.0 Update 12 Hotfix 21 (6.0.12-3698)
2018-02-01 00:00:00
Important kernel security update: Fixes for Meltdown and Spectre exploits; new kernel 2.6.32-042stab127.2 for Virtuozzo Containers for Linux 4.7, Server Bare Metal 5.0
2018-01-06 00:00:00
Important kernel security update: Fixes for Meltdown and Spectre exploits; new kernel 3.10.0-693.11.6.vz7.40.4, Virtuozzo 7.0 Update 6 Hotfix 3 (7.0.6-710)
2018-01-08 00:00:00
symantec
symantec
SA161: Local Information Disclosure Due to Meltdown and Spectre Attacks
2018-01-08 08:00:00
Multiple CPU Hardware CVE-2017-5753 Information Disclosure Vulnerability
2018-01-03 00:00:00
vmware
vmware
VMware Virtual Appliance updates address side-channel analysis due to speculative execution
2018-02-08 00:00:00
lenovo
lenovo
Reading Privileged Memory with a Side Channel - Lenovo Support US
2018-10-24 12:22:52
Reading Privileged Memory with a Side Channel - US
2018-10-24 12:22:52
f5
f5
Side-channel processor vulnerabilities CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754
2018-01-04 04:46:00
qualysblog
qualysblog
4
Meltdown/Spectre and Qualys Cloud Platform
2018-01-09 02:36:19
Apple in the InfoSec Spotlight, as GitHub Falls Prey to Amplified DDoS Attack
2018-03-02 14:48:53
Processor Vulnerabilities – Meltdown and Spectre
2018-01-04 02:17:43
arista
arista
Security Advisory 0031
2018-01-03 00:00:00
threatpost
threatpost
Experts Weigh In On Spectre Patch Challenges
2018-01-07 23:21:34
malwarebytes
malwarebytes
Meltdown and Spectre fallout: patching problems persist
2018-01-11 14:00:00
cloudfoundry
cloudfoundry
USN-3540-2: Linux kernel (Xenial HWE) vulnerabilities | Cloud Foundry
2018-01-23 00:00:00
USN-3485-2: Linux kernel (Xenial HWE) vulnerabilities | Cloud Foundry
2017-11-27 00:00:00
paloalto
paloalto
Information about Meltdown and Spectre findings
2018-01-04 00:00:00
kitploit
kitploit
Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux
2018-01-08 12:43:00
centos
centos
kernel, perf, python security update
2018-01-04 11:36:27
kernel, perf, python security update
2018-01-04 19:46:26
cisco
cisco
CPU Side-Channel Information Disclosure Vulnerabilities
2018-01-04 22:20:00
googleprojectzero
googleprojectzero
Reading privileged memory with a side-channel
2018-01-03 00:00:00
0.976 High
EPSS
Percentile
100.0%
JSON
Related for ELSA-2018-4110
nessus
62
oraclelinux
8
openvas
29
osv
1
debian
1
suse
6
ubuntu
9
redhatcve
1
mageia
1
huawei
2
ibm
24
nvidia
7
redhat
20
seebug
1
thn
1
securelist
1
virtuozzo
4
symantec
2
vmware
1
lenovo
2
f5
1
qualysblog
4
arista
1
threatpost
1
malwarebytes
1
cloudfoundry
2
paloalto
1
kitploit
1
centos
2
cisco
1
googleprojectzero
1