ELSA-2014-1724

ELSA-2014-1724 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2014-10-28

Description


[3.10.0-123.9.2]
- Oracle Linux certificates (Alexey Petrenko)

[3.10.0-123.9.2]
- [virt] kvm: fix PIT timer race condition (Petr Matousek) [1144879 1144880] {CVE-2014-3611}
- [virt] kvm/vmx: handle invept and invvpid vm exits gracefully (Petr Matousek) [1145449 1116936] [1144828 1144829] {CVE-2014-3645 CVE-2014-3646}

[3.10.0-123.9.1]
- [md] raid6: avoid data corruption during recovery of double-degraded RAID6 (Jes Sorensen) [1143850 1130905]
- [fs] ext4: fix type declaration of ext4_validate_block_bitmap (Lukas Czerner) [1140978 1091055]
- [fs] ext4: error out if verifying the block bitmap fails (Lukas Czerner) [1140978 1091055]
- [powerpc] sched: stop updating inside arch_update_cpu_topology() when nothing to be update (Gustavo Duarte) [1140300 1098372]
- [powerpc] 64bit sendfile is capped at 2GB (Gustavo Duarte) [1139126 1107774]
- [s390] fix restore of invalid floating-point-control (Hendrik Brueckner) [1138733 1121965]
- [kernel] sched/fair: Rework sched_fair time accounting (Rik van Riel) [1134717 1123731]
- [kernel] math64: Add mul_u64_u32_shr() (Rik van Riel) [1134717 1123731]
- [kernel] workqueue: zero cpumask of wq_numa_possible_cpumask on init (Motohiro Kosaki) [1134715 1117184]
- [cpufreq] acpi-cpufreq: skip loading acpi_cpufreq after intel_pstate (Motohiro Kosaki) [1134716 1123250]
- [security] selinux: Increase ebitmap_node size for 64-bit configuration (Paul Moore) [1132076 922752]
- [security] selinux: Reduce overhead of mls_level_isvalid() function call (Paul Moore) [1132076 922752]
- [ethernet] cxgb4: allow large buffer size to have page size (Gustavo Duarte) [1130548 1078977]
- [kernel] sched/autogroup: Fix race with task_groups list (Gustavo Duarte) [1129990 1081406]
- [net] sctp: inherit auth_capable on INIT collisions (Daniel Borkmann) [1124337 1123763] {CVE-2014-5077}
- [sound] alsa/control: Don't access controls outside of protected regions (Radomir Vrbovsky) [1117330 1117331] {CVE-2014-4653}


Related CVEs


CVE-2014-4653
CVE-2014-5077
CVE-2014-3611
CVE-2014-3645
CVE-2014-3646

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (x86_64) kernel-3.10.0-123.9.2.el7.src.rpm02855b1b605347b19e42adf8a6cc0d00ELBA-2021-1397-1
kernel-3.10.0-123.9.2.el7.x86_64.rpmaa0faeb6569efb96547a09ae855a88a2ELBA-2021-1397-1
kernel-abi-whitelists-3.10.0-123.9.2.el7.noarch.rpm8cf28baaa481a1b9207926d7175c2813ELBA-2021-1397-1
kernel-debug-3.10.0-123.9.2.el7.x86_64.rpm86f214dd8d36ba544df8397377f2e2b5ELBA-2021-1397-1
kernel-debug-devel-3.10.0-123.9.2.el7.x86_64.rpma663cc0486782a59db0e73e753c17d0fELBA-2021-1397-1
kernel-devel-3.10.0-123.9.2.el7.x86_64.rpmde5d53f43e9ee4db7dc5374608f98aa4ELBA-2021-1397-1
kernel-doc-3.10.0-123.9.2.el7.noarch.rpm1042a34ca11fc63ce333a87368189bf2ELBA-2021-1397-1
kernel-headers-3.10.0-123.9.2.el7.x86_64.rpmea57dad177d4d1bf9a43ae727c5c89f1ELBA-2021-1397-1
kernel-tools-3.10.0-123.9.2.el7.x86_64.rpm7faa8e20931a02e1eb6e23abfcfa3b92ELBA-2021-1397-1
kernel-tools-libs-3.10.0-123.9.2.el7.x86_64.rpm91912e2980dcb0f1a48b4d0451c5d17dELBA-2021-1397-1
kernel-tools-libs-devel-3.10.0-123.9.2.el7.x86_64.rpm9d197abac406851f5fdb927254603280ELBA-2021-1397-1
perf-3.10.0-123.9.2.el7.x86_64.rpm1336f92f68b5b9974310d66554fab61dELSA-2021-9220
python-perf-3.10.0-123.9.2.el7.x86_64.rpma70f2f7b968e0763a8afb1c7b74d8aebELSA-2021-9220



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete