[ELSA-2018-2390] kernel security and bug fix update
[2.6.32-754.3.5.OL6]
- Update genkey [bug 25599697]
[2.6.32-754.3.5]
- [kernel] cpu/hotplug: Enable 'nosmt' as late as possible (Frantisek Hrbata) [1593376] {CVE-2018-3620}
[2.6.32-754.3.4]
- [x86] x86/mm: Simplify p[g4um]d_page() macros (Josh Poimboeuf) [1593376] {CVE-2018-3620}
- [x86] x86/mm: Fix regression with huge pages on PAE (Josh Poimboeuf) [1593376] {CVE-2018-3620}
- [x86] x86/asm: Fix pud/pmd interfaces to handle large PAT bit (Josh Poimboeuf) [1593376] {CVE-2018-3620}
- [x86] x86/asm: Add pud/pmd mask interfaces to handle large PAT bit (Josh Poimboeuf) [1593376] {CVE-2018-3620}
- [x86] x86/asm: Move PUD_PAGE macros to page_types.h (Josh Poimboeuf) [1593376] {CVE-2018-3620}
- [net] tcp: detect malicious patterns in tcp_collapse_ofo_queue() (Florian Westphal) [1611376] {CVE-2018-5390}
- [net] tcp: avoid collapses in tcp_prune_queue() if possible (Florian Westphal) [1611376] {CVE-2018-5390}
- [net] tcp: free batches of packets in tcp_prune_ofo_queue() (Florian Westphal) [1611376] {CVE-2018-5390}
- [net] add rb_to_skb() and other rb tree helpers (Florian Westphal) [1611376] {CVE-2018-5390}
- [net] tcp: fix a stale ooo_last_skb after a replace (Florian Westphal) [1611376] {CVE-2018-5390}
- [net] tcp: use an RB tree for ooo receive queue (Florian Westphal) [1611376] {CVE-2018-5390}
- [net] add rbnode to struct sk_buff (Florian Westphal) [1611376] {CVE-2018-5390}
- [net] tcp: refine tcp_prune_ofo_queue() to not drop all packets (Florian Westphal) [1611376] {CVE-2018-5390}
[2.6.32-754.3.3]
- [x86] syscall: Fix regression when using the last syscall (process_vm_writev) (Lauro Ramos Venancio) [1589032] {CVE-2018-3693}
- [x86] syscall: Fix regression on strace and stap (Lauro Ramos Venancio) [1589032] {CVE-2018-3693}
[2.6.32-754.3.2]
- [kvm] VMX: Fix host GDT.LIMIT corruption (CVE-2018-10301) (Paolo Bonzini) [1601851] {CVE-2018-10901}
- [x86] Initialize __max_smt_threads to 1 (Waiman Long) [1593376] {CVE-2018-3620}
- [kernel] cpu/hotplug: detect SMT disabled by BIOS (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] topology: Add topology_max_smt_threads() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Fix incorrect error return code in vm_insert_pfn() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Initialize the vmx_l1d_flush_pages' content (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] kvm: Don't flush L1D cache if VMENTER_L1D_FLUSH_NEVER (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] kvm: Take out the unused nosmt module parameter (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] mm/dump_pagetables: Add a check_l1tf debugfs file (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] l1tf: protect _PAGE_FILE PTEs against speculation for 32-bit PAE (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Protect swap entries aganst L1TF for 32-bit PAE (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu: Make flush_l1d visible in /proc/cpuinfo (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] l1tf: protect _PAGE_FILE PTEs against speculation (Waiman Long) [1593376] {CVE-2018-3620}
- [Documentation] Add section about CPU vulnerabilities (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] bugs, kvm: Introduce boot-time control of L1TF mitigations (Waiman Long) [1593376] {CVE-2018-3620}
- [kernel] cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early (Waiman Long) [1593376] {CVE-2018-3620}
- [kernel] cpu/hotplug: Expose SMT control init function (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] kvm: Allow runtime control of L1D flush (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] kvm: Serialize L1D flush parameter setter (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] kvm: Move l1tf setup function (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] l1tf: Handle EPT disabled state proper (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] kvm: Drop L1TF MSR list approach (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] litf: Introduce vmx status variable (Waiman Long) [1593376] {CVE-2018-3620}
- [kernel] cpu/hotplug: Online siblings when SMT control is turned on (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Use MSR save list for IA32_FLUSH_CMD if required (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Extend add_atomic_switch_msr() to allow VMENTER only MSRs (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Separate the VMX AUTOLOAD guest/host number accounting (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Add find_msr() helper function (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Split the VMX MSR LOAD structures to have an host/guest numbers (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Add L1D flush logic (Waiman Long) [1593376] {CVE-2018-3620}
- [kvm] VMX: Make indirect call speculation safe (Waiman Long) [1593376] {CVE-2018-3620}
- [kvm] VMX: Enable acknowledge interupt on vmexit (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Add L1D MSR based flush (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Add L1D flush algorithm (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM/VMX: Add module argument for L1TF mitigation (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] KVM: Warn user if KVM is loaded SMT and L1TF CPU bug being present (Waiman Long) [1593376] {CVE-2018-3620}
- [kvm] x86: Introducing kvm_x86_ops VM init/destroy hooks (Waiman Long) [1593376] {CVE-2018-3620}
- [kernel] cpu/hotplug: Boot HT siblings at least once (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] Revert 'x86/apic: Ignore secondary threads if nosmt=force' (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Fix up pte->pfn conversion for PAE (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpufeatures: Add detection of L1D cache flush support. (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Extend 64bit swap file size limit (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] apic: Ignore secondary threads if nosmt=force (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu/AMD: Evaluate smp_num_siblings early (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] CPU/AMD: Do not check CPUID max ext level before parsing SMP info (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu/intel: Evaluate smp_num_siblings early (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu/topology: Provide detect_extended_topology_early() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu/common: Provide detect_ht_early() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu/AMD: Remove the pointless detect_ht() call (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu: Remove the pointless CPU printout (Waiman Long) [1593376] {CVE-2018-3620}
- [kernel] cpu/hotplug: Provide knobs to control SMT (Waiman Long) [1593376] {CVE-2018-3620}
- [kernel] cpu/hotplug: Split do_cpu_down() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] topology: Provide topology_smt_supported() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] smp: Provide topology_is_primary_thread() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] bugs: Move the l1tf function and define pr_fmt properly (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Limit swap file size to MAX_PA/2 (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Add sysfs reporting for l1tf (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Protect PROT_NONE PTEs against speculation (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Protect swap entries against L1TF (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Change order of offset/type in swap entry (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] cpu: Fix incorrect vulnerabilities files function prototypes (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] bugs: Export the internal __cpu_bugs variable (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] spec_ctrl: sync with upstream cpu_set_bug_bits() (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] intel-family.h: Add GEMINI_LAKE SOC (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] mm: Fix swap entry comment and macro (Waiman Long) [1593376] {CVE-2018-3620}
- [x86] mm: Move swap offset/type up in PTE to work around erratum (Waiman Long) [1593376] {CVE-2018-3620}
[2.6.32-754.3.1]
- [infiniband] ib/iser: Rewrite bounce buffer code path (Don Dutile) [1585312]
- [sound] alsa: pcm: prevent UAF in snd_pcm_info (CVE-2017-0861) (Jaroslav Kysela) [1565188] {CVE-2017-0861}
- [sound] alsa: seq: Fix racy pool initializations (Jaroslav Kysela) [1550176] {CVE-2018-7566}
- [sound] alsa: seq: Fix use-after-free at creating a port (Jaroslav Kysela) [1503383] {CVE-2017-15265}
- [sound] alsa: seq: Make ioctls race-free (Jaroslav Kysela) [1537452] {CVE-2018-1000004}
- [mm] reduce total RAM held in per-CPU pvecs by flushing them on compound/THP page arrival (Larry Woodman) [1575819]
- [usb] acm: fix the computation of the number of data bits (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [misc] spectre: fix gadgets found by smatch scanner, part 2 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] kvm/vmx: Remove barrier_nospec() in slot_largepage_idx() (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [kvm] Remove memory alias support (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [misc] spectre: fix gadgets found by smatch scanner (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [sound] alsa: rme9652: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [sound] alsa: opl3: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [sound] alsa: hda: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [sound] alsa: seq: oss: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [sound] alsa: seq: oss: Fix unbalanced use lock for synth MIDI device (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [net] atm: Fix potential Spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [kernel] posix-timers: Protect posix clock array access against speculation (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [kernel] sys.c: fix potential Spectre v1 issue (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [kernel] sched/autogroup: Fix possible Spectre-v1 indexing for sched_prio_to_weight [1589032] {CVE-2018-3693}
- [kernel] perf/core: Fix possible Spectre-v1 indexing for ->aux_pages [1589032] {CVE-2018-3693}
- [ipc] sysvipc/sem: mitigate semnum index against spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [sound] alsa: control: Hardening for potential Spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [media] dvb_ca_en50221: prevent using slot_info for Spectre attacs (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- media] dvb_ca_en50221: sanity check slot number from userspace (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [atm] zatm: Fix potential Spectre v1 (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] perf: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] perf: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [net] nl80211: Sanitize array index in parse_txq_params (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [include] vfs, fdtable: Prevent bounds-check bypass via speculative execution (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] syscall: Sanitize syscall table de-references under speculation (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [powerpc] Use barrier_nospec in copy_from_user() (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [include] nospec: Introduce barrier_nospec for other arches (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] Introduce barrier_nospec (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] spectre_v1: Disable compiler optimizations over array_index_mask_nospec() (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] Implement array_index_mask_nospec (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [documentation] Document array_index_nospec (Josh Poimboeuf) [1589032] {CVE-2018-3693}
dependency (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [include] nospec: Allow index argument to have const-qualified type (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [include] nospec: Kill array_index_nospec_mask_check() (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [include] nospec: Move array_index_nospec() parameter checking into separate macro (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [include] array_index_nospec: Sanitize speculative array de-references (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] get_user: Use pointer masking to limit speculation (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] Introduce __uaccess_begin_nospec() and uaccess_try_nospec (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] reorganize SMAP handling in user space accesses (Josh Poimboeuf) [1589032] {CVE-2018-3693}
- [x86] uaccess: Tell the compiler that uaccess is unlikely to fault (Josh Poimboeuf) [1589032] {CVE-2018-3693}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-6 | < 2.6.32-754.3.5.el6 |
- ID
- ELSA-2018-2390
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2018-2390.html
- Published
-
2018-08-14T00:00:00
(6 years ago) - Modified
-
2018-08-14T00:00:00
(6 years ago) - Rights
- Copyright 2018 Oracle, Inc.
- Other Advisories
-
- ALAS-2017-937
- ALAS-2018-1023
- ALAS-2018-1038
- ALAS-2018-1049
- ALAS-2018-1058
- ALAS2-2018-1038
- ALAS2-2018-1050
- ALAS2-2018-1058
- ALAS2-2018-994
- ALPINE:CVE-2018-3620
- ALPINE:CVE-2018-3646
- ASA-201808-4
- ASA-201808-5
- ASA-201808-6
- ASA-201808-7
- CISCO-SA-20180814-CPUSIDECHANNEL
- CISCO-SA-20180824-LINUX-TCP
- DSA-4187-1
- DSA-4188-1
- DSA-4266-1
- DSA-4274-1
- DSA-4279-1
- ELSA-2018-1062
- ELSA-2018-2384
- ELSA-2018-3083
- ELSA-2018-4025
- ELSA-2018-4189
- ELSA-2018-4190
- ELSA-2018-4195
- ELSA-2018-4196
- ELSA-2018-4200
- ELSA-2018-4211
- ELSA-2018-4214
- ELSA-2018-4215
- ELSA-2018-4216
- ELSA-2018-4235
- ELSA-2018-4246
- ELSA-2018-4250
- ELSA-2018-4301
- ELSA-2018-4307
- ELSA-2019-4316
- ELSA-2019-4317
- FEDORA-2017-aa9927961f
- FEDORA-2017-c110ac0eb1
- FEDORA-2017-cafcdbdde5
- FEDORA-2018-0edb45d9db
- FEDORA-2018-1621b2204a
- FEDORA-2018-1c80fea1cd
- FEDORA-2018-1e033dc308
- FEDORA-2018-2a0f8b2c9d
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-2f6df9abfb
- FEDORA-2018-3857a8b41a
- FEDORA-2018-49bda79bd5
- FEDORA-2018-4ca01704a2
- FEDORA-2018-59e4747e0f
- FEDORA-2018-6367a17aa3
- FEDORA-2018-683dfde81a
- FEDORA-2018-6e8c330d50
- FEDORA-2018-73dd8de892
- FEDORA-2018-79d7c3d2df
- FEDORA-2018-8422d94975
- FEDORA-2018-8484550fff
- FEDORA-2018-884a105c04
- FEDORA-2018-915602df63
- FEDORA-2018-93c2e74446
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9d0e4e40b5
- FEDORA-2018-9f4381d8c4
- FEDORA-2018-a0914af224
- FEDORA-2018-b57db4753c
- FEDORA-2018-b68776e5b0
- FEDORA-2018-b997780dca
- FEDORA-2018-c0a1284064
- FEDORA-2018-c449dc1c9c
- FEDORA-2018-d09a73ce72
- FEDORA-2018-d77cc41f35
- FEDORA-2018-d82b617d6c
- FEDORA-2018-ddbaca855e
- FEDORA-2018-e71875c4aa
- FEDORA-2018-e820fccd83
- FEDORA-2018-e8f793bbfc
- FEDORA-2018-f20a0cead5
- FEDORA-2018-f8cba144ae
- FEDORA-2018-fe24359b69
- FEDORA-2019-16de0047d4
- FEDORA-2019-196ab64d65
- FEDORA-2019-1b986880ea
- FEDORA-2019-20a89ca9af
- FEDORA-2019-337484d88b
- FEDORA-2019-3da64f3e61
- FEDORA-2019-4002b91800
- FEDORA-2019-509c133845
- FEDORA-2019-65c6d11eba
- FEDORA-2019-7d3500d712
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-bce6498890
- FEDORA-2019-c36afa818c
- FEDORA-2019-ce2933b003
- FREEBSD:2310B814-A652-11E8-805B-A4BADB2F4699
- GLSA-201810-06
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:2384
- RHSA-2018:2390
- RHSA-2018:2395
- RHSA-2018:3083
- RHSA-2018:3096
- SSA:2018-142-01
- SSA:2018-240-01
- SUSE-SU-2017:2847-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2017:3165-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2017:3267-1
- SUSE-SU-2017:3410-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0383-1
- SUSE-SU-2018:0416-1
- SUSE-SU-2018:0437-1
- SUSE-SU-2018:0482-1
- SUSE-SU-2018:0525-1
- SUSE-SU-2018:0555-1
- SUSE-SU-2018:0660-1
- SUSE-SU-2018:0834-1
- SUSE-SU-2018:0841-1
- SUSE-SU-2018:0848-1
- SUSE-SU-2018:0986-1
- SUSE-SU-2018:0988-1
- SUSE-SU-2018:0989-1
- SUSE-SU-2018:0990-1
- SUSE-SU-2018:0991-1
- SUSE-SU-2018:0992-1
- SUSE-SU-2018:0993-1
- SUSE-SU-2018:0994-1
- SUSE-SU-2018:0995-1
- SUSE-SU-2018:0996-1
- SUSE-SU-2018:0997-1
- SUSE-SU-2018:0998-1
- SUSE-SU-2018:0999-1
- SUSE-SU-2018:1000-1
- SUSE-SU-2018:1001-1
- SUSE-SU-2018:1002-1
- SUSE-SU-2018:1003-1
- SUSE-SU-2018:1004-1
- SUSE-SU-2018:1005-1
- SUSE-SU-2018:1006-1
- SUSE-SU-2018:1007-1
- SUSE-SU-2018:1008-1
- SUSE-SU-2018:1009-1
- SUSE-SU-2018:1010-1
- SUSE-SU-2018:1011-1
- SUSE-SU-2018:1012-1
- SUSE-SU-2018:1013-1
- SUSE-SU-2018:1014-1
- SUSE-SU-2018:1015-1
- SUSE-SU-2018:1016-1
- SUSE-SU-2018:1018-1
- SUSE-SU-2018:1019-1
- SUSE-SU-2018:1020-1
- SUSE-SU-2018:1021-1
- SUSE-SU-2018:1022-1
- SUSE-SU-2018:1023-1
- SUSE-SU-2018:1024-1
- SUSE-SU-2018:1025-1
- SUSE-SU-2018:1026-1
- SUSE-SU-2018:1027-1
- SUSE-SU-2018:1028-1
- SUSE-SU-2018:1029-1
- SUSE-SU-2018:1030-1
- SUSE-SU-2018:1031-1
- SUSE-SU-2018:1032-1
- SUSE-SU-2018:1033-1
- SUSE-SU-2018:1034-1
- SUSE-SU-2018:1035-1
- SUSE-SU-2018:1080-1
- SUSE-SU-2018:1172-1
- SUSE-SU-2018:1220-1
- SUSE-SU-2018:1221-1
- SUSE-SU-2018:1222-1
- SUSE-SU-2018:1224-1
- SUSE-SU-2018:1226-1
- SUSE-SU-2018:1227-1
- SUSE-SU-2018:1228-1
- SUSE-SU-2018:1229-1
- SUSE-SU-2018:1230-1
- SUSE-SU-2018:1231-1
- SUSE-SU-2018:1232-1
- SUSE-SU-2018:1233-1
- SUSE-SU-2018:1234-1
- SUSE-SU-2018:1235-1
- SUSE-SU-2018:1236-1
- SUSE-SU-2018:1237-1
- SUSE-SU-2018:1240-1
- SUSE-SU-2018:1241-1
- SUSE-SU-2018:1242-1
- SUSE-SU-2018:1243-1
- SUSE-SU-2018:1244-1
- SUSE-SU-2018:1245-1
- SUSE-SU-2018:1247-1
- SUSE-SU-2018:1248-1
- SUSE-SU-2018:1250-1
- SUSE-SU-2018:1251-1
- SUSE-SU-2018:1252-1
- SUSE-SU-2018:1253-1
- SUSE-SU-2018:1254-1
- SUSE-SU-2018:1255-1
- SUSE-SU-2018:1256-1
- SUSE-SU-2018:1257-1
- SUSE-SU-2018:1259-1
- SUSE-SU-2018:1260-1
- SUSE-SU-2018:1261-1
- SUSE-SU-2018:1262-1
- SUSE-SU-2018:1263-1
- SUSE-SU-2018:1264-1
- SUSE-SU-2018:1266-1
- SUSE-SU-2018:1267-1
- SUSE-SU-2018:1268-1
- SUSE-SU-2018:1269-1
- SUSE-SU-2018:1270-1
- SUSE-SU-2018:1272-1
- SUSE-SU-2018:1273-1
- SUSE-SU-2018:1309-1
- SUSE-SU-2018:2222-1
- SUSE-SU-2018:2223-1
- SUSE-SU-2018:2328-1
- SUSE-SU-2018:2331-1
- SUSE-SU-2018:2331-2
- SUSE-SU-2018:2332-1
- SUSE-SU-2018:2335-1
- SUSE-SU-2018:2338-1
- SUSE-SU-2018:2341-1
- SUSE-SU-2018:2342-1
- SUSE-SU-2018:2344-1
- SUSE-SU-2018:2344-2
- SUSE-SU-2018:2345-1
- SUSE-SU-2018:2346-1
- SUSE-SU-2018:2347-1
- SUSE-SU-2018:2348-1
- SUSE-SU-2018:2349-1
- SUSE-SU-2018:2350-1
- SUSE-SU-2018:2351-1
- SUSE-SU-2018:2352-1
- SUSE-SU-2018:2353-1
- SUSE-SU-2018:2354-1
- SUSE-SU-2018:2355-1
- SUSE-SU-2018:2356-1
- SUSE-SU-2018:2358-1
- SUSE-SU-2018:2359-1
- SUSE-SU-2018:2362-1
- SUSE-SU-2018:2363-1
- SUSE-SU-2018:2364-1
- SUSE-SU-2018:2366-1
- SUSE-SU-2018:2367-1
- SUSE-SU-2018:2368-1
- SUSE-SU-2018:2369-1
- SUSE-SU-2018:2374-1
- SUSE-SU-2018:2380-1
- SUSE-SU-2018:2381-1
- SUSE-SU-2018:2384-1
- SUSE-SU-2018:2387-1
- SUSE-SU-2018:2389-1
- SUSE-SU-2018:2391-1
- SUSE-SU-2018:2394-1
- SUSE-SU-2018:2401-1
- SUSE-SU-2018:2409-1
- SUSE-SU-2018:2410-1
- SUSE-SU-2018:2410-2
- SUSE-SU-2018:2413-1
- SUSE-SU-2018:2414-1
- SUSE-SU-2018:2416-1
- SUSE-SU-2018:2426-1
- SUSE-SU-2018:2450-1
- SUSE-SU-2018:2472-1
- SUSE-SU-2018:2473-1
- SUSE-SU-2018:2474-1
- SUSE-SU-2018:2480-1
- SUSE-SU-2018:2482-1
- SUSE-SU-2018:2483-1
- SUSE-SU-2018:2528-1
- SUSE-SU-2018:2596-1
- SUSE-SU-2018:2637-1
- SUSE-SU-2018:2787-1
- SUSE-SU-2018:2860-1
- SUSE-SU-2018:2864-1
- SUSE-SU-2018:2960-1
- SUSE-SU-2018:2961-1
- SUSE-SU-2018:2962-1
- SUSE-SU-2018:2963-1
- SUSE-SU-2018:3029-1
- SUSE-SU-2018:3172-1
- SUSE-SU-2018:3265-1
- SUSE-SU-2018:3328-1
- SUSE-SU-2018:3470-1
- SUSE-SU-2018:3490-1
- SUSE-SU-2018:3789-1
- SUSE-SU-2018:4300-1
- SUSE-SU-2019:0955-1
- SUSE-SU-2019:1425-1
- SUSE-SU-2019:1767-1
- SUSE-SU-2019:1870-1
- SUSE-SU-2019:2230-1
- SUSE-SU-2019:2601-1
- SUSE-SU-2019:2821-1
- USN-3485-1
- USN-3485-2
- USN-3485-3
- USN-3487-1
- USN-3583-1
- USN-3583-2
- USN-3617-1
- USN-3617-2
- USN-3617-3
- USN-3619-1
- USN-3619-2
- USN-3631-1
- USN-3631-2
- USN-3632-1
- USN-3698-1
- USN-3698-2
- USN-3732-1
- USN-3732-2
- USN-3740-1
- USN-3740-2
- USN-3741-1
- USN-3741-2
- USN-3742-1
- USN-3742-2
- USN-3756-1
- USN-3763-1
- USN-3798-1
- USN-3798-2
- USN-3823-1
- VU:962459
- VU:982149
- XSA-273
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2018-2390 | http://linux.oracle.com/errata/ELSA-2018-2390.html | |
CVE | CVE-2017-0861 | http://linux.oracle.com/cve/CVE-2017-0861.html | |
CVE | CVE-2017-15265 | http://linux.oracle.com/cve/CVE-2017-15265.html | |
CVE | CVE-2018-1000004 | http://linux.oracle.com/cve/CVE-2018-1000004.html | |
CVE | CVE-2018-5390 | http://linux.oracle.com/cve/CVE-2018-5390.html | |
CVE | CVE-2018-3620 | http://linux.oracle.com/cve/CVE-2018-3620.html | |
CVE | CVE-2018-3693 | http://linux.oracle.com/cve/CVE-2018-3693.html | |
CVE | CVE-2018-7566 | http://linux.oracle.com/cve/CVE-2018-7566.html | |
CVE | CVE-2018-3646 | http://linux.oracle.com/cve/CVE-2018-3646.html | |
CVE | CVE-2018-10901 | http://linux.oracle.com/cve/CVE-2018-10901.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-6 | oraclelinux | python-perf | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | oraclelinux | perf | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | oraclelinux | kernel | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | oraclelinux | kernel-headers | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | oraclelinux | kernel-firmware | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | oraclelinux | kernel-doc | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | oraclelinux | kernel-devel | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | oraclelinux | kernel-debug | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-debug-devel | < 2.6.32-754.3.5.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-6 | oraclelinux | kernel-abi-whitelists | < 2.6.32-754.3.5.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |