Type: | BUG |
Severity: | NA |
Release Date: | 2020-09-22 |
[1.0.47]
- New Ksplice release.
- Bug fix for certain client deploy models.
- Make disabling OCI checks more thorough.
[1.0.46]
- New Ksplice release.
- Use region-local updates services in OCI.
[1.0.44]
- New Ksplice release.
- Prevent stopped tasks after tracing whilst in uninterruptible sleep [Orabug: 30713152]
[1.0.43]
- New Ksplice release.
- Fix YAML parsing fail on OL6 [Orabug: 30521549]
[1.0.42]
- New Ksplice release.
- Use yaml.safe_load for compatibility with python2-pyyaml-5.1.2-1.0.1 [Orabug: 30272448]
[1.0.41]
- New Ksplice release.
[1.0.40]
- New Ksplice release.
- Fix abort on during yum update [Orabug: 30261731]
[1.0.39]
- New Ksplice release.
- libksplicehelper: crash on early stack check failure [Orabug: 30239289]
- Fix potential crash on update reversal.
[1.0.38]
- New Ksplice release.
- Bugfix: allow output to non-terminal.
- Bugfix: improve log-known-exploit output when invoked by hand with no arguments.
[1.0.37]
- New Ksplice release.
- Known exploit detection support.
[1.0.36]
- New Ksplice release.
- Fix ksplice all upgrade return code [Orabug: 28903341]
[1.0.35]
- New Ksplice release.
- Increase timeout for user-space network operations.
[1.0.34]
- New Ksplice release.
- Add upgrade_on_reboot for Xen [Orabug: 28301157]
- Fix return code for 'ksplice user show' [Orabug: 28362630]
[1.0.33]
- New Ksplice release.
- Xen autoinstall support.
[1.0.32]
- New Ksplice release.
[1.0.31]
- New Ksplice release.
[1.0.30]
- New Ksplice release.
- Support for Xen hypervisor patching.
[1.0.29]
- New Ksplice release.
[1.0.28]
- New Ksplice release.
- Add helpers for Enterprise Manager.
[1.0.27]
- New Ksplice release.
[1.0.26]
- New Ksplice release.
[1.0.25]
- New Ksplice release.
- Allocate remote stack to avoid process stack corruption [Orabug: 26620862].
[1.0.24]
- New Ksplice release.
- Improve network logging in verbose mode.
- Correctly open pager when PAGER has arguments [Orabug: 25915274].
- Add missing --pid option to ksplice user remove [Orabug: 25966501].
[1.0.22]
- New Ksplice release.
- Support SHA-256 hash verification for Ksplice updates.
- Remove duplicate debug log entries for --debug.
- Report all user-space and kernel-space errors together.
- Output the blacklist rule that is responsible for blacklisting.
- Don't patch upstart/systemd init (pid 1) to avoid SIGNAL_UNKILLABLE clearing [Orabug: 24957775]
[1.0.21]
- New Ksplice release.
- Correct exit code for 'ksplice kernel show'.
[1.0.20]
- New Ksplice release.
- Exit with return status 0 on successful user-space upgrade [Orabug: 23591838]
- Abort excessively long yum updates [Orabug: 23205210]
[1.0.19]
- New Ksplice release.
- Added ksplice-offline.
- Improve error reporting on systems with incomplete ksplice-aware installations.
- Fix dependency chain of ksplice-helper and glibc updates.
- Run cron autoinstall jobs at the correct interval.
[1.0.18]
- New Ksplice release.
- Allow yum userspace channel names to be configured in /etc/uptrack/uptrack.conf [Orabug: 22758494]
- Don't install libksplice_helper.so in /usr [Orabug: 22815521]
- Don't spawn the pager for less than a full screen of output.
- Full user-space support for UEKR1 (2.6.32) kernels.
[1.0.17]
- New Ksplice release.
- Reduce the size of debug logs on user-space failures [Orabug: 22269148]
- Handle upgrade failure retry failures correctly for user-space [Orabug: 22269177]
[1.0.16]
- New Ksplice release.
[1.0.15]
- New Ksplice release.
[1.0.14]
- New Ksplice release.
[1.0.13]
- New Ksplice release.
[1.0.12]
- New Ksplice release.
[1.0.11]
- New Ksplice release.
[1.0.10]
- New Ksplice release.
[1.0.9]
- New Ksplice release.
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | ksplice-helper-1.0.47-1.el6.src.rpm | 752544b7e47419a0e6d85521cf4df223 | ELBA-2022-9340 |
ksplice-1.0.47-1.el6.x86_64.rpm | 8d6b2673badd29dd22914e03466c7134 | ELBA-2022-9340 | |
ksplice-core0-1.0.47-1.el6.x86_64.rpm | ea2ca306e9c1b9be74ef159873f18d0c | ELBA-2022-9340 | |
ksplice-helper-1.0.47-1.el6.x86_64.rpm | c2a164c36ddb14856b21ee1af925bc16 | ELBA-2022-9340 | |
ksplice-helper-devel-1.0.47-1.el6.x86_64.rpm | ecbac663c906991604ef910dbbbf3ea5 | ELBA-2022-9340 | |
ksplice-known-exploit-detection-1.0.47-1.el6.x86_64.rpm | 8342b1fe8128d09f9ba942d850a67d54 | ELBA-2022-9340 | |
ksplice-offline-1.0.47-1.el6.x86_64.rpm | b101fbc326496c1af05f8918f3ccb949 | ELBA-2022-9340 | |
ksplice-tools-1.0.47-1.el6.x86_64.rpm | b762750da18f34697871e03c424304c4 | ELBA-2022-9340 | |
Oracle Linux 7 (x86_64) | ksplice-helper-1.0.47-1.el7.src.rpm | c62b33a3f1252970b822dbca7af890fc | ELBA-2022-9338 |
ksplice-1.0.47-1.el7.x86_64.rpm | 2a215fcd3493bebea633fbc9e5c55ac7 | ELBA-2022-9338 | |
ksplice-core0-1.0.47-1.el7.x86_64.rpm | 0edecc8547dfbc005bb9a3a54bb98ace | ELBA-2022-9338 | |
ksplice-helper-1.0.47-1.el7.x86_64.rpm | d93c5b8eb2a4f203825056777d723ae5 | ELBA-2022-9338 | |
ksplice-helper-devel-1.0.47-1.el7.x86_64.rpm | a22a0324747d5d2c03e99ddf7c7cc9f8 | ELBA-2022-9338 | |
ksplice-known-exploit-detection-1.0.47-1.el7.x86_64.rpm | 4c5d883069548575bacd9f4c0b670861 | ELBA-2022-9338 | |
ksplice-offline-1.0.47-1.el7.x86_64.rpm | 307585ed1cb54bb7c43bbb2d170ff9c7 | ELBA-2022-9338 | |
ksplice-tools-1.0.47-1.el7.x86_64.rpm | 7c0a82b0e582fdcf17515174b41ba07b | ELBA-2022-9338 | |
Oracle Linux 8 (x86_64) | ksplice-helper-1.0.47-1.el8.src.rpm | e6666c448a884397be8ac317593f5221 | - |
ksplice-1.0.47-1.el8.x86_64.rpm | ad55e16806afd1cd1822216a004d4d05 | - | |
ksplice-core0-1.0.47-1.el8.x86_64.rpm | ce99db129781d6998c1a94e29aeef0e6 | - | |
ksplice-helper-1.0.47-1.el8.x86_64.rpm | 64016023140c09b379087bc7f019c438 | - | |
ksplice-helper-devel-1.0.47-1.el8.x86_64.rpm | c2c72f5df12f9461e71286d4aa1249c0 | - | |
ksplice-known-exploit-detection-1.0.47-1.el8.x86_64.rpm | b565056c6ca241399bd6a24eca8b0974 | - | |
ksplice-offline-1.0.47-1.el8.x86_64.rpm | 01821232f3dc2ac61c7118d817759ed0 | - | |
ksplice-tools-1.0.47-1.el8.x86_64.rpm | e1a4fea3f4042dd5ea8d91f9ce69c53c | - |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team