Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2019-4836
History
Nov 12, 2019 - 12:00 a.m.
Vulners
/
Oraclelinux
/
Unbreakable Enterprise kernel security update
Unbreakable Enterprise kernel security update
2019-11-12
00:00:00
linux.oracle.com
26
EPSS
0.014
Percentile
86.7%
JSON
[4.14.35-1902.7.3]
rds: Rename rds_send_ping to rds_send_hs_ping (Hakon Bugge) [Orabug: 30418043]
rds: Use {READ,WRITE}_ONCE for heartbeat start and state (Hakon Bugge) [Orabug: 30418043]
rds: Change heartbeat params from module params to sysctl (Hakon Bugge) [Orabug: 30418043]
rds: Fix and augment probe counters (Hakon Bugge) [Orabug: 30418043]
rds: Introduce heartbeat interval (Hakon Bugge) [Orabug: 30418043]
rds: Fix heartbeat (Hakon Bugge) [Orabug: 30418043]
kexec: generate VMCOREINFO for modules (Isaac Chen) [Orabug: 30464386]
rds: RDS does not flush IPv6 neighbor cache (Ka-Cheong Poon) [Orabug: 30283690]
kvm: x86: mmu: Recovery of shattered NX large pages (Junaid Shahid) [Orabug: 29967630] {CVE-2018-12207}
kvm: Add helper function for creating VM worker threads (Junaid Shahid) [Orabug: 29967630] {CVE-2018-12207}
kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [Orabug: 29967630] {CVE-2018-12207}
x86: Add ITLB_MULTIHIT bug infrastructure (Pawan Gupta) [Orabug: 29967630] {CVE-2018-12207}
KVM: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [Orabug: 29967630] {CVE-2018-12207}
KVM: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [Orabug: 29967630] {CVE-2018-12207}
kvm: x86: Do not release the page inside mmu_set_spte() (Junaid Shahid) [Orabug: 29967630] {CVE-2018-12207}
kvm: Convert kvm_lock to a mutex (Junaid Shahid) [Orabug: 29967630] {CVE-2018-12207}
x86/tsx: Add config options to set tsx=on|off|auto (Michal Hocko) [Orabug: 30419234] {CVE-2019-11135}
x86/speculation/taa: Add documentation for TSX Async Abort (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
x86/tsx: Add ‘auto’ option to the tsx= cmdline parameter (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
kvm/x86: Export MDS_NO=0 to guests when TSX is enabled (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
x86/speculation/taa: Add sysfs reporting for TSX Async Abort (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
x86/speculation/taa: Add mitigation for TSX Async Abort (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
x86/cpu: Add a ‘tsx=’ cmdline option with TSX disabled by default (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
x86/cpu: Add a helper function x86_read_arch_cap_msr() (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
x86/msr: Add the IA32_TSX_CTRL MSR (Pawan Gupta) [Orabug: 30419234] {CVE-2019-11135}
[4.14.35-1902.7.2]
floppy: fix div-by-zero in setup_format_params (Denis Efremov) [Orabug: 30447842] {CVE-2019-14284}
perfutil: Warn when exceeding MAX_NR_CPUS in cpumap (Kyle Meyer) [Orabug: 30441330]
perf header: Replace MAX_NR_CPUS with cpu__max_cpu() (Kyle Meyer) [Orabug: 30441330]
perf machine: Replace MAX_NR_CPUS with perf_env::nr_cpus_online (Kyle Meyer) [Orabug: 30441330]
perf session: Replace MAX_NR_CPUS with perf_env::nr_cpus_online (Kyle Meyer) [Orabug: 30441330]
perf stat: Replace MAX_NR_CPUS with cpu__max_cpu() (Kyle Meyer) [Orabug: 30441330]
perf svghelper: Replace MAX_NR_CPUS with perf_env::nr_cpus_online (Kyle Meyer) [Orabug: 30441330]
perf timechart: Refactor svg_build_topology_map() (Kyle Meyer) [Orabug: 30441330]
perf tools: Increase MAX_NR_CPUS and MAX_CACHES (Kyle Meyer) [Orabug: 30441330]
x86/boot/64: Round memory hole size up to next PMD page (Steve Wahl) [Orabug: 30441300]
x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (Steve Wahl) [Orabug: 30441300]
ACPICA: Increase total number of possible Owner IDs (Bob Moore) [Orabug: 30448814]
[4.14.35-1902.7.1]
tcp: fix tcp_rtx_queue_tail in case of empty retransmit queue (Tim Froidcoeur) [Orabug: 30331228]
tcp: be more careful in tcp_fragment() (Eric Dumazet) [Orabug: 30331228]
tcp: refine memory limit test in tcp_fragment() (Eric Dumazet) [Orabug: 30331228]
scsi: mpt3sas: Bump mpt3sas driver version to 32.100.00.00 (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Fix module parameter max_msix_vectors (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Reject NVMe Encap cmnds to unsupported HBA (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Use Component img header to get Package ver (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Fail release cmnd if diag buffer is released (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Add app owned flag support for diag buffer (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Reuse diag buffer allocated at load time (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: clear release bit when buffer reregistered (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Maintain owner of buffer through UniqueID (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Free diag buffer without any status check (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Fix clear pending bit in ioctl status (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Display message before releasing diag buffer (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Register trace buffer based on NVDATA settings (Sreekanth Reddy) [Orabug: 30376510]
scsi: mpt3sas: Update driver version to 31.100.00.00 (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Run SAS DEVICE STATUS CHANGE EVENT from ISR (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Reduce the performance drop (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Handle fault during HBA initialization (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Add sysfs to know supported features (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Support MEMORY MOVE Tool box command (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Allow ioctls to blocked access status NVMe (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Enumerate SES of a managed PCIe switch (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Update MPI headers to 2.6.8 spec (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Gracefully handle online firmware update (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: memset request frame before reusing (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Add support for PCIe Lane margin (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: support target smid for [abort|query] task (Minwoo Im) [Orabug: 30299961]
scsi: mpt3sas: clean up a couple sizeof() uses (Dan Carpenter) [Orabug: 30299961]
scsi: mpt3sas: Fix msix load balance on and off settings (Sreekanth Reddy) [Orabug: 30299961]
scsi: mpt3sas: Determine smp affinity on per HBA basis (Sreekanth Reddy) [Orabug: 30299961]
scsi: mpt3sas: Use configured PCIe link speed, not max (Sreekanth Reddy) [Orabug: 30299961]
scsi: mpt3sas: Remove CPU arch check to determine perf_mode (Sreekanth Reddy) [Orabug: 30299961]
scsi: mpt3sas: use DEVICE_ATTR_{RO, RW} (Tomas Henzl) [Orabug: 30299961]
scsi: mpt3sas: make driver options visible in sys (Tomas Henzl) [Orabug: 30299961]
scsi: mpt3sas: Mark expected switch fall-through (Gustavo A. R. Silva) [Orabug: 30299961]
scsi: mpt3sas: Update driver version to 29.100.00.00 (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Introduce perf_mode module parameter (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Enable interrupt coalescing on high iops (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Affinity high iops queues IRQs to local node (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: save and use MSI-X index for posting RD (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Use high iops queues under some circumstances (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: change _base_get_msix_index prototype (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Add flag high_iops_queues (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: function pointers of request descriptor (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas_ctl: fix double-fetch bug in _ctl_ioctl_main() (Gen Zhang) [Orabug: 30299961]
scsi: mpt3sas: fix indentation issue (Colin Ian King) [Orabug: 30299961]
scsi: mpt3sas: Fix kernel panic during expander reset (Sreekanth Reddy) [Orabug: 30299961]
scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Improve the threshold value and introduce module param (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Irq poll to avoid CPU hard lockups (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: simplify interrupt handler (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Fix typo in request_desript_type (Suganath Prabu) [Orabug: 30299961]
scsi: mpt3sas: Add missing breaks in switch statements (Gustavo A. R. Silva) [Orabug: 30299961]
scsi: mpt3sas: Update driver version to 27.102.00.00 (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Add support for ATLAS PCIe switch (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Add support for NVMe Switch Adapter (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: Rename mpi endpoint device ID macro. (Suganath Prabu S) [Orabug: 30299961]
scsi: mpt3sas: mpt3sas_scsih: Mark expected switch fall-through (Gustavo A. R. Silva) [Orabug: 30299961]
[4.14.35-1902.7.0]
rds: fix uninteneded increase of rds_rdma:pool->max_items_soft (Manjunath Patil) [Orabug: 30397933]
ACPI / APEI: Fix parsing HEST that includes Deferred Machine Check subtable (Yazen Ghannam) [Orabug: 30385327]
rds: add ibmr to busy_list in flush code path (Manjunath Patil) [Orabug: 30383090]
net-sysfs: Fix mem leak in netdev_register_kobject (YueHaibing) [Orabug: 30350262] {CVE-2019-15916}
kernel-uek.spec: defuse a memory bomb in xargs (Lukas Lipinsky) [Orabug: 30339974]
xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (Dongli Zhang) [Orabug: 30395404]
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
7
src
kernel-uek
< 4.14.35-1902.7.3.el7uek
kernel-uek-4.14.35-1902.7.3.el7uek.src.rpm
oracle linux
7
aarch64
kernel-uek
< 4.14.35-1902.7.3.el7uek
kernel-uek-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-debug
< 4.14.35-1902.7.3.el7uek
kernel-uek-debug-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-debug-devel
< 4.14.35-1902.7.3.el7uek
kernel-uek-debug-devel-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-devel
< 4.14.35-1902.7.3.el7uek
kernel-uek-devel-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-headers
< 4.14.35-1902.7.3.el7uek
kernel-uek-headers-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-tools
< 4.14.35-1902.7.3.el7uek
kernel-uek-tools-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-tools-libs
< 4.14.35-1902.7.3.el7uek
kernel-uek-tools-libs-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-tools-libs-devel
< 4.14.35-1902.7.3.el7uek
kernel-uek-tools-libs-devel-4.14.35-1902.7.3.el7uek.aarch64.rpm
oracle linux
7
aarch64
perf
< 4.14.35-1902.7.3.el7uek
perf-4.14.35-1902.7.3.el7uek.aarch64.rpm
Rows per page:
10
1-10 of 18
1
Related
nessus 57
openvas 26
vmware 1
redhat 20
suse 2
osv 7
mskb 1
oraclelinux 13
citrix 1
centos 2
mageia 3
f5 3
fedora 10
redhatcve 4
veracode 3
cve 4
prion 4
cvelist 4
ubuntucve 4
debiancve 4
nvd 4
xen 2
symantec 2
amazon 2
freebsd 1
freebsd_advisory 1
mscve 2
intel 2
alpinelinux 1
photon 1
ibm 2
rocky 1
ubuntu 2
thn 1
almalinux 1
virtuozzo 1
nessus
nessus
57
Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4836)
2019-11-14 00:00:00
RHEL 7 : Virtualization Manager (RHSA-2019:3860)
2019-11-14 00:00:00
RHEL 7 : kpatch-patch (RHSA-2020:0028)
2020-01-07 00:00:00
openvas
openvas
26
SUSE: Security Advisory (SUSE-SU-2019:3340-1)
2021-04-19 00:00:00
openSUSE: Security Advisory for spectre-meltdown-checker (openSUSE-SU-2019:2710-1)
2020-01-09 00:00:00
SUSE: Security Advisory (SUSE-SU-2019:3348-1)
2021-06-09 00:00:00
vmware
vmware
VMware ESXi, Workstation, and Fusion patches provide Hypervisor-Specific Mitigations for Speculative-Execution Vulnerabilities (CVE-2018-12207, CVE-2019-11135)
2019-11-12 00:00:00
redhat
redhat
20
(RHSA-2019:3843) Important: kernel security update
2019-11-12 20:16:37
(RHSA-2020:0026) Important: kpatch-patch security update
2020-01-06 13:40:28
(RHSA-2020:0028) Important: kpatch-patch security update
2020-01-06 13:41:18
suse
suse
Security update for spectre-meltdown-checker (moderate)
2019-12-31 00:00:00
Security update for qemu (important)
2019-11-14 00:00:00
osv
osv
7
spectre-meltdown-checker-0.44-1.2 on GA media
2024-06-15 00:00:00
linux - security update
2019-11-12 00:00:00
linux-4.9 - security update
2019-11-12 00:00:00
mskb
mskb
November 12, 2019—KB4525245 (OS Build 15063.2172)
2019-11-12 00:00:00
oraclelinux
oraclelinux
13
Unbreakable Enterprise kernel security update
2019-11-12 00:00:00
microcode_ctl security update
2019-12-04 00:00:00
microcode_ctl security update
2019-12-04 00:00:00
citrix
citrix
Citrix Hypervisor Security Update
2019-11-12 05:00:00
centos
centos
bpftool, kernel, perf, python security update
2019-11-14 19:41:10
kernel, perf, python security update
2019-11-14 01:19:32
mageia
mageia
Updated kernel packages fix security vulnerabilities
2019-11-20 00:16:53
Updated microcode packages fix security vulnerabilities
2019-12-26 01:57:53
Updated microcode packages fix security vulnerabilities
2019-11-20 00:16:53
f5
f5
K57418558 : Linux kernel vulnerability CVE-2019-15916
2019-10-24 00:00:00
K17269881 : Intel MCE vulnerability CVE-2018-12207
2019-12-04 00:00:00
K02912734 : Intel CPU vulnerability CVE-2019-11135
2019-11-15 00:00:00
fedora
fedora
10
[SECURITY] Fedora 30 Update: kernel-tools-5.3.11-200.fc30
2019-11-13 06:28:06
[SECURITY] Fedora 30 Update: microcode_ctl-2.1-33.fc30
2019-11-13 06:28:06
[SECURITY] Fedora 30 Update: kernel-headers-5.3.11-200.fc30
2019-11-13 06:28:06
redhatcve
redhatcve
4
CVE-2019-15916
2019-09-10 14:22:04
CVE-2019-14284
2020-04-07 11:38:42
CVE-2018-12207
2020-04-09 10:06:17
veracode
veracode
Denial Of Service (DoS)
2019-11-07 00:18:56
Denial Of Service (DoS)
2019-11-13 00:19:59
Information Disclosure
2019-11-13 00:20:00
cve
cve
4
CVE-2019-15916
2019-09-04 15:15:11
CVE-2019-14284
2019-07-26 13:15:13
CVE-2018-12207
2019-11-14 20:15:11
prion
prion
4
Memory corruption
2019-09-04 15:15:00
Design/Logic Flaw
2019-07-26 13:15:00
Input validation
2019-11-14 20:15:00
cvelist
cvelist
4
CVE-2019-15916
2019-09-04 14:58:01
CVE-2019-14284
2019-07-26 12:25:01
CVE-2018-12207
2019-11-14 19:08:45
ubuntucve
ubuntucve
4
CVE-2019-14284
2019-07-26 00:00:00
CVE-2019-15916
2019-09-04 00:00:00
CVE-2018-12207
2019-11-12 00:00:00
debiancve
debiancve
4
CVE-2019-15916
2019-09-04 15:15:11
CVE-2019-14284
2019-07-26 13:15:13
CVE-2018-12207
2019-11-14 20:15:11
nvd
nvd
4
CVE-2019-15916
2019-09-04 15:15:11
CVE-2019-14284
2019-07-26 13:15:13
CVE-2018-12207
2019-11-14 20:15:11
xen
xen
x86: Machine Check Error on Page Size Change DoS
2019-11-12 17:53:00
TSX Asynchronous Abort speculative side channel
2019-11-12 17:53:00
symantec
symantec
Multiple Intel Processors CVE-2018-12207 Denial of Service Vulnerability
2019-11-12 00:00:00
Multiple Intel Processors Side Channel CVE-2019-11135 Information Disclosure Vulnerability
2019-11-12 00:00:00
amazon
amazon
Important: kernel
2019-11-19 17:31:00
Important: kernel
2019-11-19 17:52:00
freebsd
freebsd
FreeBSD -- Machine Check Exception on Page Size Change
2019-11-14 00:00:00
freebsd_advisory
freebsd_advisory
FreeBSD-SA-19:25.mcepsc
2019-11-12 00:00:00
mscve
mscve
Windows Denial of Service Vulnerability
2019-11-12 08:00:00
Windows Kernel Information Disclosure Vulnerability
2019-11-12 08:00:00
intel
intel
2019.2 IPU – Intel® Processor Machine Check Error Advisory
2021-05-11 00:00:00
2019.2 IPU – TSX Asynchronous Abort Advisory
2021-05-11 00:00:00
alpinelinux
alpinelinux
CVE-2019-11135
2019-11-14 19:15:13
photon
photon
Home Download Photon OS User Documentation FAQ Security Advisories Related Information Lightwave - PHSA-2019-2.0-0191
2019-11-25 00:00:00
ibm
ibm
Security Bulletin: Vulnerability in side channel in Intel CPUs affect IBM Cloud Pak System (CVE-2019-11135)
2020-09-11 12:51:54
Security Bulletin: IBM QRadar SIEM is vulnerable to side channel attack with Intel CPUs (CVE-2019-11135)
2020-04-22 17:48:50
rocky
rocky
virt:rhel security update
2020-01-29 13:42:54
ubuntu
ubuntu
Linux kernel vulnerability
2019-11-13 00:00:00
Linux kernel vulnerability
2019-11-13 00:00:00
thn
thn
New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs
2019-11-13 15:46:00
almalinux
almalinux
Moderate: virt:rhel security update
2020-01-29 13:42:54
virtuozzo
virtuozzo
Important kernel security update: New kernel 2.6.32-042stab141.3 for Virtuozzo Containers for Linux 4.7, Server Bare Metal 5.0
2019-11-21 00:00:00
EPSS
0.014
Percentile
86.7%
JSON
Related for ELSA-2019-4836
nessus
57
openvas
26
vmware
1
redhat
20
suse
2
osv
7
mskb
1
oraclelinux
13
citrix
1
centos
2
mageia
3
f5
3
fedora
10
redhatcve
4
veracode
3
cve
4
prion
4
cvelist
4
ubuntucve
4
debiancve
4
nvd
4
xen
2
symantec
2
amazon
2
freebsd
1
freebsd_advisory
1
mscve
2
intel
2
alpinelinux
1
photon
1
ibm
2
rocky
1
ubuntu
2
thn
1
almalinux
1
virtuozzo
1