Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2019-2703
History
Sep 12, 2019 - 12:00 a.m.
Vulners
/
Oraclelinux
/
kernel security and bug fix update
kernel security and bug fix update
2019-09-12
00:00:00
linux.oracle.com
75
0.007 Low
EPSS
Percentile
80.1%
JSON
[4.18.0-80.11.1_0.OL8]
Oracle Linux certificates (Alexey Petrenko)
Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
Update x509.genkey [Orabug: 24817676]
[4.18.0-80.11.1_0]
[wireless] mwifiex: Don’t abort on small, spec-compliant vendor IEs (Jarod Wilson) [1714475 1728992]
[wireless] mwifiex: fix 802.11n/WPA detection (Jarod Wilson) [1714475 1714476] {CVE-2019-3846}
[4.18.0-80.10.1_0]
[x86] x86/entry/64: Use JMP instead of JMPQ (Josh Poimboeuf) [1724500 1724501] {CVE-2019-1125}
[x86] x86/speculation: Enable Spectre v1 swapgs mitigations (Josh Poimboeuf) [1724500 1724501] {CVE-2019-1125}
[x86] x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations (Josh Poimboeuf) [1724500 1724501] {CVE-2019-1125}
[x86] x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (Josh Poimboeuf) [1724500 1724501] {CVE-2019-1125}
[x86] x86/cpufeatures: Carve out CQM features retrieval (Josh Poimboeuf) [1724500 1724501] {CVE-2019-1125}
[4.18.0-80.9.1_0]
[netdrv] thunderx: eliminate extra calls to put_page() for pages held for recycling (Dean Nelson) [1726354 1644011]
[netdrv] thunderx: enable page recycling for non-XDP case (Dean Nelson) [1726354 1644011]
[arm64] arm64: kaslr: ensure randomized quantities are clean also when kaslr is off (Mark Salter) [1726357 1673068]
[arm64] arm64: kaslr: ensure randomized quantities are clean to the PoC (Mark Salter) [1726357 1673068]
[mm] powerpc/mm/64s/hash: Reallocate context ids on fork (Gustavo Duarte) [1734689 1723808] {CVE-2019-12817}
[powerpc] powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (Steve Best) [1733282 1720929]
[powerpc] powerpc/pseries/mobility: prevent cpu hotplug during DT update (Steve Best) [1733282 1720929]
[powerpc] powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (Steve Best) [1733282 1720929]
[powerpc] powerpc/watchpoint: Restore NV GPRs while returning from exception (Steve Best) [1733281 1728557]
[hid] HID: i2c-hid: Don’t reset device upon system resume (Perry Yuan) [1727098 1715385]
[netdrv] net/mlx5e: RX, Verify MPWQE stride size is in range (Alaa Hleihel) [1726372 1683589]
[sound] ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c (Jaroslav Kysela) [1726371 1658924] {CVE-2018-19824}
[sound] ALSA: hda - Enable runtime PM only for discrete GPU (Jaroslav Kysela) [1726361 1714817]
[cpufreq] cpufreq: intel_pstate: Ignore turbo active ratio in HWP (David Arcari) [1726360 1711970]
[infiniband] usnic_verbs: fix deadlock (Govindarajulu Varadarajan) [1726358 1688505]
[infiniband] IB/usnic: Fix locking when unregistering (Govindarajulu Varadarajan) [1726358 1688505]
[infiniband] IB/usnic: Fix potential deadlock (Govindarajulu Varadarajan) [1726358 1688505]
[netdrv] igb: shorten maximum PHC timecounter update interval (Corinna Vinschen) [1726352 1637098]
[netdrv] igb: shorten maximum PHC timecounter update interval (Corinna Vinschen) [1726352 1637098]
[x86] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (Frank Ramsay) [1724534 1677695]
[security] selinux: overhaul sidtab to fix bug and improve performance (Ondrej Mosnacek) [1717780 1656787]
[security] selinux: use separate table for initial SID lookup (Ondrej Mosnacek) [1717780 1656787]
[security] selinux: refactor sidtab conversion (Ondrej Mosnacek) [1717780 1656787]
[security] selinux: Cleanup printk logging in sidtab (Ondrej Mosnacek) [1717780 1656787]
[security] selinux: Cleanup printk logging in services (Ondrej Mosnacek) [1717780 1656787]
[security] selinux: Cleanup printk logging in policydb (Ondrej Mosnacek) [1717780 1656787]
[crypto] crypto: authenc - fix parsing key with misaligned rta_len (Herbert Xu) [1715335 1707546]
[mm] mm, page_alloc: fix has_unmovable_pages for HugePages (David Gibson) [1714758 1688114]
[wireless] mwifiex: Abort at too short BSS descriptor element (Jarod Wilson) [1714475 1714476] {CVE-2019-3846}
[wireless] mwifiex: Fix possible buffer overflows at parsing bss descriptor (Jarod Wilson) [1714475 1714476] {CVE-2019-3846}
[nvme] nvme-pci: add missing unlock for reset error (Gopal Tiwari) [1712261 1703201]
[nvme] nvme-pci: fix rapid add remove sequence (Gopal Tiwari) [1712261 1703201]
[wireless] brcmfmac: add subtype check for event handling in data path (Stanislaw Gruszka) [1733895 1704684] {CVE-2019-9503}
[wireless] brcmfmac: assure SSID length from firmware is limited (Stanislaw Gruszka) [1705385 1705386] {CVE-2019-9500}
[include] fs: fix kABI for struct pipe_buf_operations (Miklos Szeredi) [1705006 1705007] {CVE-2019-11487}
[fs] fs: prevent page refcount overflow in pipe_buf_get (Miklos Szeredi) [1705006 1705007] {CVE-2019-11487}
[mm] mm: prevent get_user_pages() from overflowing page refcount (Miklos Szeredi) [1705006 1705007] {CVE-2019-11487}
[include] mm: add ‘try_get_page()’ helper function (Miklos Szeredi) [1705006 1705007] {CVE-2019-11487}
[include] mm: make page ref count overflow check tighter and more explicit (Miklos Szeredi) [1705006 1705007] {CVE-2019-11487}
[fs] fuse: call pipe_buf_release() under pipe lock (Miklos Szeredi) [1705006 1705007] {CVE-2019-11487}
[kvm] KVM: x86: nVMX: fix x2APIC VTPR read intercept (Vitaly Kuznetsov) [1697198 1697199]
[kvm] KVM: x86: nVMX: close leak of L0’s x2APIC MSRs (CVE-2019-3887) (Vitaly Kuznetsov) [1697198 1697199]
[4.18.0-80.8.1_0]
[documentation] Documentation: Add ARM64 to kernel-parameters.rst (Jeremy Linton) [1726353 1640855]
[arm64] arm64/speculation: Support ‘mitigations=’ cmdline option (Jeremy Linton) [1726353 1640855]
[arm64] arm64: ssbs: Don’t treat CPUs with SSBS as unaffected by SSB (Jeremy Linton) [1726353 1640855]
[arm64] arm64: enable generic CPU vulnerabilites support (Jeremy Linton) [1726353 1640855]
[arm64] arm64: add sysfs vulnerability show for speculative store bypass (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Always enable ssb vulnerability detection (Jeremy Linton) [1726353 1640855]
[arm64] arm64: add sysfs vulnerability show for spectre-v2 (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Always enable spectre-v2 vulnerability detection (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Advertise mitigation of Spectre-v2, or lack thereof (Jeremy Linton) [1726353 1640855]
[arm64] arm64: add sysfs vulnerability show for meltdown (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Add sysfs vulnerability show for spectre-v1 (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Provide a command line to disable spectre_v2 mitigation (Jeremy Linton) [1726353 1640855]
[documentation] powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg (Jeremy Linton) [1726353 1640855]
[documentation] Documentation: Document arm64 kpti control (Jeremy Linton) [1726353 1640855]
[arm64] arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Add MIDR encoding for HiSilicon Taishan CPUs (Jeremy Linton) [1726353 1640855]
[arm64] arm64: kpti: Whitelist Cortex-A CPUs that don’t implement the CSV3 field (Jeremy Linton) [1726353 1640855]
[arm64] arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (Jeremy Linton) [1726353 1640855]
[arm64] arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (Jeremy Linton) [1726353 1640855]
[arm64] arm64: capabilities: Merge duplicate Cavium erratum entries (Jeremy Linton) [1726353 1640855]
[arm64] arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (Jeremy Linton) [1726353 1640855]
[arm64] arm64: Use a raw spinlock in __install_bp_hardening_cb() (Jeremy Linton) [1726353 1640855]
[arm64] arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (Jeremy Linton) [1726353 1640855]
[arm64] arm64: fix SSBS sanitization (Jeremy Linton) [1726353 1640855]
[arm64] arm64: don’t zero DIT on signal return (Jeremy Linton) [1726353 1640855]
[kvm] KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (Jeremy Linton) [1726353 1640855]
[arm64] arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 (Jeremy Linton) [1726353 1640855]
[arm64] arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (Jeremy Linton) [1726353 1640855]
[arm64] arm64: cpufeature: Detect SSBS and advertise to userspace (Jeremy Linton) [1726353 1640855]
(Jeremy Linton) [1726353 1640855]
Revert: [arm64] arm64/speculation: Support ‘mitigations=’ cmdline option (Josh Poimboeuf) [1726353 1640855] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091}
[kernel] ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (Aristeu Rozanski) [1730958 1730959] {CVE-2019-13272}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
8
src
kernel
< 4.18.0-80.11.1.el8_0
kernel-4.18.0-80.11.1.el8_0.src.rpm
oracle linux
8
aarch64
kernel-tools-libs-devel
< 4.18.0-80.11.1.el8_0
kernel-tools-libs-devel-4.18.0-80.11.1.el8_0.aarch64.rpm
oracle linux
8
src
kernel
< 4.18.0-80.11.1.el8_0
kernel-4.18.0-80.11.1.el8_0.src.rpm
oracle linux
8
x86_64
bpftool
< 4.18.0-80.11.1.el8_0
bpftool-4.18.0-80.11.1.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel
< 4.18.0-80.11.1.el8_0
kernel-4.18.0-80.11.1.el8_0.x86_64.rpm
oracle linux
8
noarch
kernel-abi-whitelists
< 4.18.0-80.11.1.el8_0
kernel-abi-whitelists-4.18.0-80.11.1.el8_0.noarch.rpm
oracle linux
8
x86_64
kernel-core
< 4.18.0-80.11.1.el8_0
kernel-core-4.18.0-80.11.1.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel-cross-headers
< 4.18.0-80.11.1.el8_0
kernel-cross-headers-4.18.0-80.11.1.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel-debug
< 4.18.0-80.11.1.el8_0
kernel-debug-4.18.0-80.11.1.el8_0.x86_64.rpm
oracle linux
8
x86_64
kernel-debug-core
< 4.18.0-80.11.1.el8_0
kernel-debug-core-4.18.0-80.11.1.el8_0.x86_64.rpm
Rows per page:
10
1-10 of 23
1
Related
nessus 87
redhat 26
openvas 31
fedora 2
intel 1
osv 5
oraclelinux 7
centos 6
ubuntu 5
ibm 6
thn 1
threatpost 1
myhack58 2
checkpoint_security 1
freebsd_advisory 1
f5 1
suse 5
cloudfoundry 2
xen 1
mageia 1
debian 3
huawei 1
virtuozzo 1
amazon 1
vmware 1
nessus
nessus
87
CentOS 8 : kernel (CESA-2019:2703)
2021-01-29 00:00:00
Oracle Linux 8 : kernel (ELSA-2019-2703)
2019-09-16 00:00:00
RHEL 8 : kernel (RHSA-2019:2703)
2019-09-11 00:00:00
redhat
redhat
26
(RHSA-2019:2703) Important: kernel security and bug fix update
2019-09-10 10:36:22
(RHSA-2019:2741) Important: kernel-rt security and bug fix update
2019-09-11 16:33:02
(RHSA-2019:1186) Important: libvirt security update
2019-05-14 20:13:20
openvas
openvas
31
Huawei EulerOS: Security Advisory for qemu (EulerOS-SA-2019-2300)
2020-01-23 00:00:00
SUSE: Security Advisory (SUSE-SU-2019:1296-1)
2021-04-19 00:00:00
SUSE: Security Advisory (SUSE-SU-2019:1313-1)
2021-06-09 00:00:00
fedora
fedora
[SECURITY] Fedora 30 Update: qemu-3.1.0-8.fc30
2019-05-17 01:08:38
[SECURITY] Fedora 30 Update: xen-4.11.1-5.fc30
2019-05-18 01:05:01
intel
intel
Microarchitectural Data Sampling Advisory
2021-05-11 00:00:00
osv
osv
5
linux-4.9 - security update
2019-05-15 00:00:00
intel-microcode - security update
2019-05-15 00:00:00
intel-microcode - security update
2019-05-15 00:00:00
oraclelinux
oraclelinux
7
Unbreakable Enterprise kernel security update
2019-05-14 00:00:00
qemu-kvm security update
2019-05-14 00:00:00
libvirt security update
2019-05-15 00:00:00
centos
centos
6
qemu security update
2019-05-15 20:31:32
libvirt security update
2019-05-15 15:41:00
libvirt security update
2019-05-15 20:33:30
ubuntu
ubuntu
5
Intel Microcode update
2019-06-20 00:00:00
Linux kernel (Trusty HWE) vulnerabilities
2019-05-15 00:00:00
libvirt update
2019-05-15 00:00:00
ibm
ibm
6
Security Bulletin: IBM Netezza Firmware Diagnostics Support Tool is affected by the vulnerabilities known as Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities
2019-12-30 14:48:58
Security Bulletin: IBM Cloud Pak System is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites
2020-05-06 12:02:05
Security Bulletin: IBM Security QRadar Packet Capture is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
2020-10-28 17:16:55
thn
thn
New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011
2019-05-14 20:20:00
threatpost
threatpost
Intel CPUs Impacted By New Class of Spectre-Like Attacks
2019-05-14 18:01:49
myhack58
myhack58
Zombieload: Intel CPU exposure of a new side channel attack-exploit warning-the black bar safety net
2019-05-15 00:00:00
Intel official for 5 on 15, the aeration out of the CPU side channel vulnerabilities“ZombieLoad”detailed technical analysis on-the vulnerability warning-the black bar safety net
2019-05-20 00:00:00
checkpoint_security
checkpoint_security
Check Point Response to Intel Microarchitectural Data Sampling Vulnerabilities (Fallout, RIDL, Zombieload) (CVE-2018-12126 , CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
2019-05-15 20:26:43
freebsd_advisory
freebsd_advisory
FreeBSD-SA-19:07.mds
2019-05-14 00:00:00
f5
f5
K41283800 : INTEL-SA-00233 Microarchitectural Data Sampling Advisory
2019-05-15 00:00:00
suse
suse
5
Security update for ucode-intel (important)
2019-05-16 00:00:00
Security update for qemu (important)
2019-05-20 00:00:00
Security update for ucode-intel (important)
2019-07-24 00:00:00
cloudfoundry
cloudfoundry
USN-3977-3: Intel Microcode update (AKA ZombieLoad Attack) | Cloud Foundry
2019-07-12 00:00:00
USN-3977-2: Intel Microcode update (AKA ZombieLoad Attack) | Cloud Foundry
2019-05-29 00:00:00
xen
xen
Microarchitectural Data Sampling speculative side channel
2019-05-14 15:51:00
mageia
mageia
Updated virtualbox packages fix security vulnerabilities
2019-05-18 15:33:10
debian
debian
[SECURITY] [DLA 1789-1] intel-microcode security update
2019-05-16 03:05:39
[SECURITY] [DLA 1789-2] intel-microcode security update
2019-06-20 21:50:38
[SECURITY] [DSA 4447-1] intel-microcode security update
2019-05-15 09:23:15
huawei
huawei
Security Advisory - Intel Microarchitectural Data Sampling (MDS) vulnerabilities
2019-07-12 00:00:00
virtuozzo
virtuozzo
Important kernel security update: New kernel 2.6.32-042stab138.1; Virtuozzo 6.0 Update 12 Hotfix 40 (6.0.12-3739)
2019-05-16 00:00:00
amazon
amazon
Important: qemu-kvm
2019-08-07 23:12:00
vmware
vmware
VMware product updates enable Hypervisor-Specific Mitigations, Hypervisor-Assisted Guest Mitigations, and Operating System-Specific Mitigations for Microarchitectural Data Sampling (MDS) Vulnerabilities (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091)
2019-05-14 00:00:00
0.007 Low
EPSS
Percentile
80.1%
JSON
Related for ELSA-2019-2703
nessus
87
redhat
26
openvas
31
fedora
2
intel
1
osv
5
oraclelinux
7
centos
6
ubuntu
5
ibm
6
thn
1
threatpost
1
myhack58
2
checkpoint_security
1
freebsd_advisory
1
f5
1
suse
5
cloudfoundry
2
xen
1
mageia
1
debian
3
huawei
1
virtuozzo
1
amazon
1
vmware
1