Type: | BUG |
Impact: | NA |
Release Date: | 2020-06-25 |
[3.10.0-1127.13.1.0.1.el7.OL7]
- [x86] efi/x86: Restore x86/efi: Use efi_switch_mm() rather twiddling with %cr3 [Orabug: 31142229]
- [x86] efi/x86: Partial revert x86/efi: Use efi_switch_mm() rather twiddling with %cr3. (Mike Kravetz) [Orabug: 30598533]
- [xen/balloon] Support xend-based toolstack (Orabug: 28663970)
- [x86/apic/x2apic] avoid allocate multiple irq vectors for a single interrupt on multiple cpu, otherwise irq vectors would be used up when there are only 2 cpu online per node. [Orabug: 28691156]
- [bonding] avoid repeated display of same link status change. [Orabug: 28109857]
- [ipc] ipc/sem.c: bugfix for semctl(,,GETZCNT) (Manfred Spraul) [Orabug: 22552377
[3.10.0-1127.13.1.el7.OL7]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
[3.10.0-1127.13.1.el7]
- [x86] x86/speculation: Support old struct x86_cpu_id & x86_match_cpu() kABI (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [cpufreq] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827187 1827188] {CVE-2020-0543}
header (Waiman Long) [1827187 1827188] {CVE-2020-0543}
[3.10.0-1127.12.1.el7]
- [x86] x86/speculation: Prevent deadlock on ssb_state::lock (Waiman Long) [1841121 1836322]
- [vfio] vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio/pci: call irq_bypass_unregister_producer() before freeing irq (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
- [vfio] vfio_pci: Enable memory accesses before calling pci_map_rom (Alex Williamson) [1837297 1820632] {CVE-2020-12888}
[3.10.0-1127.11.1.el7]
- [fs] cachefiles: Fix race between read_waiter and read_copier involving op->to_do (Dave Wysochanski) [1839757 1829662]
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (x86_64) | kernel-3.10.0-1127.13.1.0.1.el7.src.rpm | 122400da533b08ae35761d7b19887733b4a6a0f7085ed41fbe115e5b178f5a7f | ELSA-2025-1281 | ol7_x86_64_MODRHCK |
bpftool-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 3515fbb20fc98e6b225c6eadc473377c28ebf3c825d83f668cd3135ae33164aa | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 82655ee7da89db81788db6b1ea5825dba3922a19886faedcea42485a97999c63 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-abi-whitelists-3.10.0-1127.13.1.0.1.el7.noarch.rpm | f52e67811e6610438d4aa2fb902e8402fc7c7fb0b43c48bd6ba53d3d0b07caed | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-debug-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | a036e95ddc3e0dac4ff4b044f9669b4dfa8e4ce22d42e234346b8be7960cb9d2 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-debug-devel-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 867d7de9ec8e29425be307b63c83dd8dbe54246e8991b4a4c25b08cbe7c3c8f0 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-devel-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 523bf5434541014e58f3fe08016a7d624de2eba3b7b7609d8e14fdc8490e8a99 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-doc-3.10.0-1127.13.1.0.1.el7.noarch.rpm | 6291bd6d2735868bc895c0f83e48894cc8c8ed489d830e457afe7be550c7d19a | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-headers-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | d04615cb18eaa10aea6f7f88ab574374bf7297db70ad8abf293360b0d460f550 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-tools-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 79487c15951b055f82e4006c49fcad6ec3e60c54f982f10c211248616ab71ae7 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-tools-libs-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 83f363bd926a25edb3c1aa08a752f1a88ba6067361715084384c15628a779441 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
kernel-tools-libs-devel-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 2038d8045c8d830fcfe1abbacc7950214f7e0f8a59b305fcb4e0f34f6354b227 | ELSA-2025-1281 | ol7_x86_64_MODRHCK | |
perf-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | 0c5797706ed9edb33f09184c373de2d3f5f9251a11cf01b2f71c33469dad8e79 | ELSA-2025-20019 | ol7_x86_64_MODRHCK | |
python-perf-3.10.0-1127.13.1.0.1.el7.x86_64.rpm | bc03d4c047be543e0dc9e9d2b7c8c13d2488d235ade6187d84a1f04980fd1fa2 | ELSA-2025-20019 | ol7_x86_64_MODRHCK |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team