ELSA-2014-1724

ELSA-2014-1724 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-10-28

Description


[3.10.0-123.9.2]
- Oracle Linux certificates (Alexey Petrenko)

[3.10.0-123.9.2]
- [virt] kvm: fix PIT timer race condition (Petr Matousek) [1144879 1144880] {CVE-2014-3611}
- [virt] kvm/vmx: handle invept and invvpid vm exits gracefully (Petr Matousek) [1145449 1116936] [1144828 1144829] {CVE-2014-3645 CVE-2014-3646}

[3.10.0-123.9.1]
- [md] raid6: avoid data corruption during recovery of double-degraded RAID6 (Jes Sorensen) [1143850 1130905]
- [fs] ext4: fix type declaration of ext4_validate_block_bitmap (Lukas Czerner) [1140978 1091055]
- [fs] ext4: error out if verifying the block bitmap fails (Lukas Czerner) [1140978 1091055]
- [powerpc] sched: stop updating inside arch_update_cpu_topology() when nothing to be update (Gustavo Duarte) [1140300 1098372]
- [powerpc] 64bit sendfile is capped at 2GB (Gustavo Duarte) [1139126 1107774]
- [s390] fix restore of invalid floating-point-control (Hendrik Brueckner) [1138733 1121965]
- [kernel] sched/fair: Rework sched_fair time accounting (Rik van Riel) [1134717 1123731]
- [kernel] math64: Add mul_u64_u32_shr() (Rik van Riel) [1134717 1123731]
- [kernel] workqueue: zero cpumask of wq_numa_possible_cpumask on init (Motohiro Kosaki) [1134715 1117184]
- [cpufreq] acpi-cpufreq: skip loading acpi_cpufreq after intel_pstate (Motohiro Kosaki) [1134716 1123250]
- [security] selinux: Increase ebitmap_node size for 64-bit configuration (Paul Moore) [1132076 922752]
- [security] selinux: Reduce overhead of mls_level_isvalid() function call (Paul Moore) [1132076 922752]
- [ethernet] cxgb4: allow large buffer size to have page size (Gustavo Duarte) [1130548 1078977]
- [kernel] sched/autogroup: Fix race with task_groups list (Gustavo Duarte) [1129990 1081406]
- [net] sctp: inherit auth_capable on INIT collisions (Daniel Borkmann) [1124337 1123763] {CVE-2014-5077}
- [sound] alsa/control: Don't access controls outside of protected regions (Radomir Vrbovsky) [1117330 1117331] {CVE-2014-4653}


Related CVEs


CVE-2014-3645
CVE-2014-3646
CVE-2014-4653
CVE-2014-3611
CVE-2014-5077

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-3.10.0-123.9.2.el7.src.rpm2fb5991960cb2f37ed39f57e0799fc0a1ea55c0d6f59c51992d63e59fb749adbELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-123.9.2.el7.src.rpm2fb5991960cb2f37ed39f57e0799fc0a1ea55c0d6f59c51992d63e59fb749adbELSA-2025-1281ol7_x86_64_optional_archive
kernel-3.10.0-123.9.2.el7.src.rpm2fb5991960cb2f37ed39f57e0799fc0a1ea55c0d6f59c51992d63e59fb749adbELSA-2025-1281ol7_x86_64_u0_patch
kernel-3.10.0-123.9.2.el7.x86_64.rpmdeb7e432acb412cbd8954b2c33e9f3321b11773f9c1a42ae4fc2708a834f15b7ELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-123.9.2.el7.x86_64.rpmdeb7e432acb412cbd8954b2c33e9f3321b11773f9c1a42ae4fc2708a834f15b7ELSA-2025-1281ol7_x86_64_u0_patch
kernel-abi-whitelists-3.10.0-123.9.2.el7.noarch.rpm6bcec168e3a7b8bbc97660828f941e93b358a4b23a7b14a7dae0ae42b5909d61ELSA-2025-1281ol7_x86_64_latest_archive
kernel-abi-whitelists-3.10.0-123.9.2.el7.noarch.rpm6bcec168e3a7b8bbc97660828f941e93b358a4b23a7b14a7dae0ae42b5909d61ELSA-2025-1281ol7_x86_64_u0_patch
kernel-debug-3.10.0-123.9.2.el7.x86_64.rpm567e39c5642e41a06f373b9a83fc5c207ae1899b206487593171b015eed511ceELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-3.10.0-123.9.2.el7.x86_64.rpm567e39c5642e41a06f373b9a83fc5c207ae1899b206487593171b015eed511ceELSA-2025-1281ol7_x86_64_u0_patch
kernel-debug-devel-3.10.0-123.9.2.el7.x86_64.rpm636df03518ef3c93f6b71058676e9437befd7517cf5946ed369015d1fdf578f0ELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-devel-3.10.0-123.9.2.el7.x86_64.rpm636df03518ef3c93f6b71058676e9437befd7517cf5946ed369015d1fdf578f0ELSA-2025-1281ol7_x86_64_u0_patch
kernel-devel-3.10.0-123.9.2.el7.x86_64.rpmc9b8d1a11698867bc97b435096a029eac2778c1b989eec86e80ff52393876745ELSA-2025-1281ol7_x86_64_latest_archive
kernel-devel-3.10.0-123.9.2.el7.x86_64.rpmc9b8d1a11698867bc97b435096a029eac2778c1b989eec86e80ff52393876745ELSA-2025-1281ol7_x86_64_u0_patch
kernel-doc-3.10.0-123.9.2.el7.noarch.rpm18e0c4e18d980520cc391e045823b8f146f348c28d3d458acf4f7be6ef6308f8ELSA-2025-1281ol7_x86_64_optional_archive
kernel-headers-3.10.0-123.9.2.el7.x86_64.rpm1bfbce1b140f9757c894a47dbcae1bf4f7d298cb14209387a390f780f6fceb4aELSA-2025-1281ol7_x86_64_latest_archive
kernel-headers-3.10.0-123.9.2.el7.x86_64.rpm1bfbce1b140f9757c894a47dbcae1bf4f7d298cb14209387a390f780f6fceb4aELSA-2025-1281ol7_x86_64_u0_patch
kernel-tools-3.10.0-123.9.2.el7.x86_64.rpmc654d8203473d737fa28e4e674d58faa76e95b88e376d67fbb97b79130b16788ELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-3.10.0-123.9.2.el7.x86_64.rpmc654d8203473d737fa28e4e674d58faa76e95b88e376d67fbb97b79130b16788ELSA-2025-1281ol7_x86_64_u0_patch
kernel-tools-libs-3.10.0-123.9.2.el7.x86_64.rpme175a425437bdca929a13dd76b1045e862a2fa8e1cfca255a281a58a9d1b3864ELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-libs-3.10.0-123.9.2.el7.x86_64.rpme175a425437bdca929a13dd76b1045e862a2fa8e1cfca255a281a58a9d1b3864ELSA-2025-1281ol7_x86_64_u0_patch
kernel-tools-libs-devel-3.10.0-123.9.2.el7.x86_64.rpme140d5523b0f81b6fc5be859f8554f8150daebd628e6e9e609e39a665f914d41ELSA-2025-1281ol7_x86_64_optional_archive
perf-3.10.0-123.9.2.el7.x86_64.rpmcc484382b79d6c4538df80ee64413f30e4a68c2c18197a35de9a4a27d8d48aa3ELSA-2025-20019ol7_x86_64_latest_archive
perf-3.10.0-123.9.2.el7.x86_64.rpmcc484382b79d6c4538df80ee64413f30e4a68c2c18197a35de9a4a27d8d48aa3ELSA-2025-20019ol7_x86_64_u0_patch
python-perf-3.10.0-123.9.2.el7.x86_64.rpm9b23ba3e2d93769d54bd5153b1ea31478740a19b0af7b6ec82bed846d69b67b9ELSA-2025-20019ol7_x86_64_optional_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete