Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2019-1479
History
Jul 30, 2019 - 12:00 a.m.
Vulners
/
Oraclelinux
/
kernel security and bug fix update
kernel security and bug fix update
2019-07-30
00:00:00
linux.oracle.com
41
0.974 High
EPSS
Percentile
99.9%
JSON
[4.18.0-80.4.2_0.OL8]
Oracle Linux certificates (Alexey Petrenko)
Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
Update x509.genkey [Orabug: 24817676]
[4.18.0-80.4.2_0]
[net] tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (Florian Westphal) [1719922 1719923] {CVE-2019-11479}
[net] tcp: add tcp_min_snd_mss sysctl (Florian Westphal) [1719922 1719923] {CVE-2019-11479}
[net] tcp: tcp_fragment() should apply sane memory limits (Florian Westphal) [1719857 1719858] {CVE-2019-11478}
[net] tcp: limit payload size of sacked skbs (Florian Westphal) [1719602 1719603] {CVE-2019-11477}
[4.18.0-80.4.1_0]
[netdrv] ice: Do autoneg based on VSI state (Jonathan Toppins) [1709433 1687903]
[arm64] arm64: apply workaround on A64FX v1r0 (Mark Langsdorf) [1700901 1692306]
[arm64] arm64/speculation: Support ‘mitigations=’ cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[s390] s390/speculation: Support ‘mitigations=’ cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[powerpc] powerpc/speculation: Support ‘mitigations=’ cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[powerpc] powerpc/64: Disable the speculation barrier from the command line (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add ‘mitigations=’ support for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation: Support ‘mitigations=’ cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[kernel] cpu/speculation: Add ‘mitigations=’ cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Fix comment (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add SMT warning message (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation: Move arch_smt_update() call to after mitigation decisions (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add mds=full, nosmt cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[documentation] Documentation: Add MDS vulnerability documentation (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[documentation] Documentation: Move L1TF to separate directory (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add mitigation mode VMWERV (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add sysfs reporting for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add mitigation control for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Clear CPU buffers on exit to user (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add mds_clear_cpu_buffers() (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[kvm] x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add BUG_MSBDS_ONLY (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation/mds: Add basic bug infrastructure for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation: Consolidate CPU whitelists (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/msr-index: Cleanup bit defines (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/speculation: Cast ~SPEC_CTRL_STIBP atomic value to int (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[x86] x86/cpu: Sanitize FAM6_ATOM naming (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
file (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[tools] tools include: Adopt linux/bits.h (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[4.18.0-80.3.1_0]
[mm] mm: enforce min addr even if capable() in expand_downwards() (Rafael Aquini) [1708829 1687667] {CVE-2019-9213}
[powerpc] powerpc/radix: Fix kernel crash with mremap() (Steve Best) [1708617 1674186]
[powerpc] powerpc/security: Fix spectre_v2 reporting (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc/powernv: Query firmware for count cache flush settings (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc/pseries: Query hypervisor for count cache flush settings (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc/64s: Add support for software count cache flush (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc/64s: Add new security feature flags for count cache flush (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc/asm: Add a patch_site macro & helpers for patching instructions (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc/64: Call setup_barrier_nospec() from setup_arch() (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (Gustavo Duarte) [1708112 1694456]
[powerpc] powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (Gustavo Duarte) [1708112 1694456]
[of] of: __of_detach_node() - remove node from phandle cache (Steve Best) [1708102 1669198]
[of] of: of_node_get()/of_node_put() nodes held in phandle cache (Steve Best) [1708102 1669198]
[fs] debugfs: Fix EPERM regression from kernel lockdown check (Lenny Szubowicz) [1708100 1686755]
[block] nvme: lock NS list changes while handling command effects (David Milburn) [1701140 1672759]
[4.18.0-80.2.1_0]
[netdrv] qed: Fix qed_mcp_halt|resume() (Manish Chopra) [1704184 1697310]
[cpufreq] cpufreq: intel_pstate: Also use CPPC nominal_perf for base_frequency (Prarit Bhargava) [1706739 1696131]
[acpi] ACPI / CPPC: Fix guaranteed performance handling (Prarit Bhargava) [1706739 1696131]
[arm64] arm64: Add workaround for Fujitsu A64FX erratum 010001 (Mark Langsdorf) [1700902 1666951]
[s390] vfio_ap: link the vfio_ap devices to the vfio_ap bus subsystem (Cornelia Huck) [1700290 1686044]
[netdrv] net/mlx4_en: Force CHECKSUM_NONE for short ethernet frames (Alaa Hleihel) [1700289 1651509]
[netdrv] net/mlx5e: Force CHECKSUM_UNNECESSARY for short ethernet frames (Alaa Hleihel) [1700289 1651509]
[pci] PCI: pciehp: Fix re-enabling the slot marked for safe removal (Myron Stowe) [1700288 1695922]
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
8
src
kernel
< 4.18.0-80.4.2.el8_0
kernel-4.18.0-80.4.2.el8_0.src.rpm
oracle linux
8
aarch64
kernel-tools-libs-devel
< 4.18.0-80.4.2.el8_0
kernel-tools-libs-devel-4.18.0-80.4.2.el8_0.aarch64.rpm
oracle linux
8
src
kernel
< 4.18.0-80.4.2.el8_0
kernel-4.18.0-80.4.2.el8_0.src.rpm
oracle linux
8
x86_64
bpftool
< 4.18.0-80.4.2.el8_0
bpftool-4.18.0-80.4.2.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel
< 4.18.0-80.4.2.el8_0
kernel-4.18.0-80.4.2.el8_0.x86_64.rpm
oracle linux
8
noarch
kernel-abi-whitelists
< 4.18.0-80.4.2.el8_0
kernel-abi-whitelists-4.18.0-80.4.2.el8_0.noarch.rpm
oracle linux
8
x86_64
kernel-core
< 4.18.0-80.4.2.el8_0
kernel-core-4.18.0-80.4.2.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel-cross-headers
< 4.18.0-80.4.2.el8_0
kernel-cross-headers-4.18.0-80.4.2.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel-debug
< 4.18.0-80.4.2.el8_0
kernel-debug-4.18.0-80.4.2.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel-debug-core
< 4.18.0-80.4.2.el8_0
kernel-debug-core-4.18.0-80.4.2.el8_0.x86_64.rpm
Rows per page:
10
1-10 of 23
1
Related
ibm 9
redhat 24
oraclelinux 7
nessus 78
fedora 2
checkpoint_security 1
freebsd_advisory 1
openvas 35
centos 4
f5 1
suse 7
ubuntu 4
cloudfoundry 3
xen 1
mageia 3
debian 5
huawei 1
virtuozzo 2
osv 3
amazon 3
vmware 1
lenovo 2
hp 1
threatpost 1
ibm
ibm
9
Security Bulletin: IBM Netezza Host Management is affected by the vulnerabilities known as Intel Microarchitectural Data Sampling (MDS) and other Kernel vulnerabilities
2019-10-18 03:36:34
Security Bulletin: IBM Cloud Pak System is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites
2020-05-06 12:02:05
Security Bulletin: IBM Security QRadar Packet Capture is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
2020-10-28 17:16:55
redhat
redhat
24
(RHSA-2019:1480) Important: kernel-rt security and bug fix update
2019-06-17 19:45:02
(RHSA-2019:1479) Important: kernel security and bug fix update
2019-06-17 17:30:08
(RHSA-2019:1201) Important: qemu-kvm-rhev security update
2019-05-14 20:39:25
oraclelinux
oraclelinux
7
kernel security and bug fix update
2019-06-18 00:00:00
libvirt security update
2019-05-14 00:00:00
kernel security and bug fix update
2019-05-14 00:00:00
nessus
nessus
78
Oracle Linux 8 : kernel (ELSA-2019-1479)
2019-08-12 00:00:00
RHEL 8 : kernel (RHSA-2019:1479)
2019-06-18 00:00:00
CentOS 8 : kernel (CESA-2019:1479)
2021-01-29 00:00:00
fedora
fedora
[SECURITY] Fedora 30 Update: xen-4.11.1-5.fc30
2019-05-18 01:05:01
[SECURITY] Fedora 30 Update: libvirt-5.1.0-5.fc30
2019-05-17 01:08:36
checkpoint_security
checkpoint_security
Check Point Response to Intel Microarchitectural Data Sampling Vulnerabilities (Fallout, RIDL, Zombieload) (CVE-2018-12126 , CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
2019-05-15 20:26:43
freebsd_advisory
freebsd_advisory
FreeBSD-SA-19:07.mds
2019-05-14 00:00:00
openvas
openvas
35
SUSE: Security Advisory (SUSE-SU-2019:1347-1)
2021-04-19 00:00:00
SUSE: Security Advisory (SUSE-SU-2019:1452-1)
2021-04-19 00:00:00
SUSE: Security Advisory (SUSE-SU-2019:1243-1)
2021-04-19 00:00:00
centos
centos
4
libvirt security update
2019-05-15 20:33:30
kernel, perf, python security update
2019-05-15 15:42:15
qemu security update
2019-05-15 15:40:19
f5
f5
K41283800 : INTEL-SA-00233 Microarchitectural Data Sampling Advisory
2019-05-15 00:00:00
suse
suse
7
Security update for ucode-intel (important)
2019-05-16 00:00:00
Security update for qemu (important)
2019-05-20 00:00:00
Security update for ucode-intel (important)
2019-07-24 00:00:00
ubuntu
ubuntu
4
Intel Microcode update
2019-05-22 00:00:00
libvirt update
2019-05-16 00:00:00
Linux kernel vulnerabilities
2019-05-15 00:00:00
cloudfoundry
cloudfoundry
USN-3977-3: Intel Microcode update (AKA ZombieLoad Attack) | Cloud Foundry
2019-07-12 00:00:00
USN-3977-2: Intel Microcode update (AKA ZombieLoad Attack) | Cloud Foundry
2019-05-29 00:00:00
USN-3977-1: Intel Microcode update (AKA ZombieLoad Attack) | Cloud Foundry
2019-05-20 00:00:00
xen
xen
Microarchitectural Data Sampling speculative side channel
2019-05-14 15:51:00
mageia
mageia
Updated virtualbox packages fix security vulnerabilities
2019-05-18 15:33:10
Updated microcode packages fix security vulnerabilities
2019-05-16 11:25:22
Updated kernel packages fix security vulnerability
2019-05-16 11:25:22
debian
debian
5
[SECURITY] [DLA 1789-1] intel-microcode security update
2019-05-16 03:05:39
[SECURITY] [DLA 1789-2] intel-microcode security update
2019-06-20 21:50:38
[SECURITY] [DSA 4447-1] intel-microcode security update
2019-05-15 09:23:15
huawei
huawei
Security Advisory - Intel Microarchitectural Data Sampling (MDS) vulnerabilities
2019-07-12 00:00:00
virtuozzo
virtuozzo
Important kernel security update: New kernel 2.6.32-042stab138.1; Virtuozzo 6.0 Update 12 Hotfix 40 (6.0.12-3739)
2019-05-16 00:00:00
Important kernel security update: New kernel 2.6.32-042stab138.1 for Virtuozzo Containers for Linux 4.7, Server Bare Metal 5.0
2019-05-16 00:00:00
osv
osv
intel-microcode - security update
2019-05-15 00:00:00
intel-microcode - security update
2019-06-20 00:00:00
linux - security update
2019-05-14 00:00:00
amazon
amazon
Important: qemu-kvm
2019-08-07 23:12:00
Important: kernel
2019-05-07 22:39:00
Important: kernel
2019-05-07 22:54:00
vmware
vmware
VMware product updates enable Hypervisor-Specific Mitigations, Hypervisor-Assisted Guest Mitigations, and Operating System-Specific Mitigations for Microarchitectural Data Sampling (MDS) Vulnerabilities (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091)
2019-05-14 00:00:00
lenovo
lenovo
Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities - US
2019-05-14 16:38:15
Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities - Lenovo Support US
2019-05-14 16:38:15
hp
hp
HPSBHF03618 rev. 8 - Intel Microarchitectural Data Sampling Security Updates
2019-05-14 00:00:00
threatpost
threatpost
Intel ZombieLoad Side-Channel Attack: 10 Takeaways
2019-05-15 16:48:11
0.974 High
EPSS
Percentile
99.9%
JSON
Related for ELSA-2019-1479
ibm
9
redhat
24
oraclelinux
7
nessus
78
fedora
2
checkpoint_security
1
freebsd_advisory
1
openvas
35
centos
4
f5
1
suse
7
ubuntu
4
cloudfoundry
3
xen
1
mageia
3
debian
5
huawei
1
virtuozzo
2
osv
3
amazon
3
vmware
1
lenovo
2
hp
1
threatpost
1