Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2019-4629
History
May 14, 2019 - 12:00 a.m.
Vulners
/
Oraclelinux
/
Unbreakable Enterprise kernel security update
Unbreakable Enterprise kernel security update
2019-05-14
00:00:00
linux.oracle.com
78
0.001 Low
EPSS
Percentile
40.6%
JSON
[4.1.12-124.26.12]
x86/mds: Add empty commit for CVE-2019-11091 (Konrad Rzeszutek Wilk) [Orabug: 29721935] {CVE-2019-11091}
x86/microcode: Add loader version file in debugfs (Boris Ostrovsky) [Orabug: 29754165]
x86/microcode: Fix CPU synchronization routine (Borislav Petkov) [Orabug: 29754165]
x86/microcode: Synchronize late microcode loading (Borislav Petkov) [Orabug: 29754165]
[4.1.12-124.26.11]
x86/speculation: Support ‘mitigations=’ cmdline option (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
cpu/speculation: Add ‘mitigations=’ cmdline option (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (Konrad Rzeszutek Wilk) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Fix comment (Boris Ostrovsky) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: update mds_mitigation to reflect debugfs configuration (Mihai Carabas) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: fix microcode late loading (Mihai Carabas) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add boot option to enable MDS protection only while in idle (Boris Ostrovsky) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Improve coverage for MDS vulnerability (Boris Ostrovsky) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add SMT warning message (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add mds=full,nosmt cmdline option (Josh Poimboeuf) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
Documentation: Add MDS vulnerability documentation (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
Documentation: Move L1TF to separate directory (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add mitigation mode VMWERV (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add debugfs for controlling MDS (Kanth Ghatraju) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add sysfs reporting for MDS (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add mitigation control for MDS (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Clear CPU buffers on exit to user (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add mds_clear_cpu_buffers() (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Andi Kleen) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add BUG_MSBDS_ONLY (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation/mds: Add basic bug infrastructure for MDS (Andi Kleen) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation: Consolidate CPU whitelists (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/msr-index: Cleanup bit defines (Thomas Gleixner) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
Documentation/l1tf: Fix small spelling typo (Salvatore Bonaccorso) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
x86/speculation: Simplify the CPU bug detection logic (Dominik Brodowski) [Orabug: 29526900] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
6
src
kernel-uek
< 4.1.12-124.26.12.el6uek
kernel-uek-4.1.12-124.26.12.el6uek.src.rpm
oracle linux
6
x86_64
kernel-uek
< 4.1.12-124.26.12.el6uek
kernel-uek-4.1.12-124.26.12.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-debug
< 4.1.12-124.26.12.el6uek
kernel-uek-debug-4.1.12-124.26.12.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-debug-devel
< 4.1.12-124.26.12.el6uek
kernel-uek-debug-devel-4.1.12-124.26.12.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-devel
< 4.1.12-124.26.12.el6uek
kernel-uek-devel-4.1.12-124.26.12.el6uek.x86_64.rpm
oracle linux
6
noarch
kernel-uek-doc
< 4.1.12-124.26.12.el6uek
kernel-uek-doc-4.1.12-124.26.12.el6uek.noarch.rpm
oracle linux
6
noarch
kernel-uek-firmware
< 4.1.12-124.26.12.el6uek
kernel-uek-firmware-4.1.12-124.26.12.el6uek.noarch.rpm
oracle linux
7
src
kernel-uek
< 4.1.12-124.26.12.el7uek
kernel-uek-4.1.12-124.26.12.el7uek.src.rpm
oracle linux
7
x86_64
kernel-uek
< 4.1.12-124.26.12.el7uek
kernel-uek-4.1.12-124.26.12.el7uek.x86_64.rpm
oracle linux
7
x86_64
kernel-uek-debug
< 4.1.12-124.26.12.el7uek
kernel-uek-debug-4.1.12-124.26.12.el7uek.x86_64.rpm
Rows per page:
10
1-10 of 14
1
Related
fedora 2
checkpoint_security 1
ibm 6
freebsd_advisory 1
openvas 34
nessus 86
redhat 24
centos 6
f5 1
suse 5
ubuntu 5
cloudfoundry 2
xen 1
mageia 1
debian 3
huawei 1
oraclelinux 6
virtuozzo 1
osv 5
amazon 2
vmware 1
intel 1
thn 1
threatpost 1
myhack58 2
fedora
fedora
[SECURITY] Fedora 30 Update: xen-4.11.1-5.fc30
2019-05-18 01:05:01
[SECURITY] Fedora 30 Update: qemu-3.1.0-8.fc30
2019-05-17 01:08:38
checkpoint_security
checkpoint_security
Check Point Response to Intel Microarchitectural Data Sampling Vulnerabilities (Fallout, RIDL, Zombieload) (CVE-2018-12126 , CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
2019-05-15 20:26:43
ibm
ibm
6
Security Bulletin: IBM Cloud Pak System is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites
2020-05-06 12:02:05
Security Bulletin: IBM Security QRadar Packet Capture is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
2020-10-28 17:16:55
Security Bulletin: IBM QRadar SIEM is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
2019-11-06 11:47:58
freebsd_advisory
freebsd_advisory
FreeBSD-SA-19:07.mds
2019-05-14 00:00:00
openvas
openvas
34
SUSE: Security Advisory (SUSE-SU-2019:1347-1)
2021-04-19 00:00:00
SUSE: Security Advisory (SUSE-SU-2019:1452-1)
2021-04-19 00:00:00
SUSE: Security Advisory (SUSE-SU-2019:1243-1)
2021-04-19 00:00:00
nessus
nessus
86
RHEL 7 : qemu-kvm-rhev (RHSA-2019:1200)
2024-04-27 00:00:00
RHEL 7 : qemu-kvm-rhev (RHSA-2019:1199)
2024-04-27 00:00:00
EulerOS Virtualization 3.0.1.0 : kvm (EulerOS-SA-2019-1611)
2019-05-30 00:00:00
redhat
redhat
24
(RHSA-2019:1201) Important: qemu-kvm-rhev security update
2019-05-14 20:39:25
(RHSA-2019:1208) Important: rhvm-appliance security update
2019-05-14 20:38:48
(RHSA-2019:1197) Important: libvirt security update
2019-05-14 20:13:13
centos
centos
6
libvirt security update
2019-05-15 20:33:30
kernel, perf, python security update
2019-05-15 15:42:15
qemu security update
2019-05-15 20:31:32
f5
f5
K41283800 : INTEL-SA-00233 Microarchitectural Data Sampling Advisory
2019-05-15 00:00:00
suse
suse
5
Security update for ucode-intel (important)
2019-05-16 00:00:00
Security update for ucode-intel (important)
2019-07-24 00:00:00
Security update for qemu (important)
2019-05-20 00:00:00
ubuntu
ubuntu
5
Intel Microcode update
2019-05-22 00:00:00
libvirt update
2019-05-16 00:00:00
Intel Microcode update
2019-06-20 00:00:00
cloudfoundry
cloudfoundry
USN-3977-3: Intel Microcode update (AKA ZombieLoad Attack) | Cloud Foundry
2019-07-12 00:00:00
USN-3977-2: Intel Microcode update (AKA ZombieLoad Attack) | Cloud Foundry
2019-05-29 00:00:00
xen
xen
Microarchitectural Data Sampling speculative side channel
2019-05-14 15:51:00
mageia
mageia
Updated virtualbox packages fix security vulnerabilities
2019-05-18 15:33:10
debian
debian
[SECURITY] [DLA 1789-1] intel-microcode security update
2019-05-16 03:05:39
[SECURITY] [DLA 1789-2] intel-microcode security update
2019-06-20 21:50:38
[SECURITY] [DSA 4447-1] intel-microcode security update
2019-05-15 09:23:15
huawei
huawei
Security Advisory - Intel Microarchitectural Data Sampling (MDS) vulnerabilities
2019-07-12 00:00:00
oraclelinux
oraclelinux
6
libvirt security update
2019-05-14 00:00:00
kernel security and bug fix update
2019-05-14 00:00:00
qemu-kvm security update
2019-05-15 00:00:00
virtuozzo
virtuozzo
Important kernel security update: New kernel 2.6.32-042stab138.1; Virtuozzo 6.0 Update 12 Hotfix 40 (6.0.12-3739)
2019-05-16 00:00:00
osv
osv
5
intel-microcode - security update
2019-05-15 00:00:00
intel-microcode - security update
2019-06-20 00:00:00
linux - security update
2019-05-14 00:00:00
amazon
amazon
Important: qemu-kvm
2019-08-07 23:12:00
Important: kernel
2019-05-07 22:39:00
vmware
vmware
VMware product updates enable Hypervisor-Specific Mitigations, Hypervisor-Assisted Guest Mitigations, and Operating System-Specific Mitigations for Microarchitectural Data Sampling (MDS) Vulnerabilities (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091)
2019-05-14 00:00:00
intel
intel
Microarchitectural Data Sampling Advisory
2021-05-11 00:00:00
thn
thn
New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011
2019-05-14 20:20:00
threatpost
threatpost
Intel CPUs Impacted By New Class of Spectre-Like Attacks
2019-05-14 18:01:49
myhack58
myhack58
Zombieload: Intel CPU exposure of a new side channel attack-exploit warning-the black bar safety net
2019-05-15 00:00:00
Intel official for 5 on 15, the aeration out of the CPU side channel vulnerabilities“ZombieLoad”detailed technical analysis on-the vulnerability warning-the black bar safety net
2019-05-20 00:00:00
0.001 Low
EPSS
Percentile
40.6%
JSON
Related for ELSA-2019-4629
fedora
2
checkpoint_security
1
ibm
6
freebsd_advisory
1
openvas
34
nessus
86
redhat
24
centos
6
f5
1
suse
5
ubuntu
5
cloudfoundry
2
xen
1
mageia
1
debian
3
huawei
1
oraclelinux
6
virtuozzo
1
osv
5
amazon
2
vmware
1
intel
1
thn
1
threatpost
1
myhack58
2