Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2014-10-28 |
[3.10.0-123.9.2]
- Oracle Linux certificates (Alexey Petrenko)
[3.10.0-123.9.2]
- [virt] kvm: fix PIT timer race condition (Petr Matousek) [1144879 1144880] {CVE-2014-3611}
- [virt] kvm/vmx: handle invept and invvpid vm exits gracefully (Petr Matousek) [1145449 1116936] [1144828 1144829] {CVE-2014-3645 CVE-2014-3646}
[3.10.0-123.9.1]
- [md] raid6: avoid data corruption during recovery of double-degraded RAID6 (Jes Sorensen) [1143850 1130905]
- [fs] ext4: fix type declaration of ext4_validate_block_bitmap (Lukas Czerner) [1140978 1091055]
- [fs] ext4: error out if verifying the block bitmap fails (Lukas Czerner) [1140978 1091055]
- [powerpc] sched: stop updating inside arch_update_cpu_topology() when nothing to be update (Gustavo Duarte) [1140300 1098372]
- [powerpc] 64bit sendfile is capped at 2GB (Gustavo Duarte) [1139126 1107774]
- [s390] fix restore of invalid floating-point-control (Hendrik Brueckner) [1138733 1121965]
- [kernel] sched/fair: Rework sched_fair time accounting (Rik van Riel) [1134717 1123731]
- [kernel] math64: Add mul_u64_u32_shr() (Rik van Riel) [1134717 1123731]
- [kernel] workqueue: zero cpumask of wq_numa_possible_cpumask on init (Motohiro Kosaki) [1134715 1117184]
- [cpufreq] acpi-cpufreq: skip loading acpi_cpufreq after intel_pstate (Motohiro Kosaki) [1134716 1123250]
- [security] selinux: Increase ebitmap_node size for 64-bit configuration (Paul Moore) [1132076 922752]
- [security] selinux: Reduce overhead of mls_level_isvalid() function call (Paul Moore) [1132076 922752]
- [ethernet] cxgb4: allow large buffer size to have page size (Gustavo Duarte) [1130548 1078977]
- [kernel] sched/autogroup: Fix race with task_groups list (Gustavo Duarte) [1129990 1081406]
- [net] sctp: inherit auth_capable on INIT collisions (Daniel Borkmann) [1124337 1123763] {CVE-2014-5077}
- [sound] alsa/control: Don't access controls outside of protected regions (Radomir Vrbovsky) [1117330 1117331] {CVE-2014-4653}
CVE-2014-4653 |
CVE-2014-5077 |
CVE-2014-3611 |
CVE-2014-3645 |
CVE-2014-3646 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (x86_64) | kernel-3.10.0-123.9.2.el7.src.rpm | 02855b1b605347b19e42adf8a6cc0d00 | ELBA-2021-1397-1 |
kernel-3.10.0-123.9.2.el7.x86_64.rpm | aa0faeb6569efb96547a09ae855a88a2 | ELBA-2021-1397-1 | |
kernel-abi-whitelists-3.10.0-123.9.2.el7.noarch.rpm | 8cf28baaa481a1b9207926d7175c2813 | ELBA-2021-1397-1 | |
kernel-debug-3.10.0-123.9.2.el7.x86_64.rpm | 86f214dd8d36ba544df8397377f2e2b5 | ELBA-2021-1397-1 | |
kernel-debug-devel-3.10.0-123.9.2.el7.x86_64.rpm | a663cc0486782a59db0e73e753c17d0f | ELBA-2021-1397-1 | |
kernel-devel-3.10.0-123.9.2.el7.x86_64.rpm | de5d53f43e9ee4db7dc5374608f98aa4 | ELBA-2021-1397-1 | |
kernel-doc-3.10.0-123.9.2.el7.noarch.rpm | 1042a34ca11fc63ce333a87368189bf2 | ELBA-2021-1397-1 | |
kernel-headers-3.10.0-123.9.2.el7.x86_64.rpm | ea57dad177d4d1bf9a43ae727c5c89f1 | ELBA-2021-1397-1 | |
kernel-tools-3.10.0-123.9.2.el7.x86_64.rpm | 7faa8e20931a02e1eb6e23abfcfa3b92 | ELBA-2021-1397-1 | |
kernel-tools-libs-3.10.0-123.9.2.el7.x86_64.rpm | 91912e2980dcb0f1a48b4d0451c5d17d | ELBA-2021-1397-1 | |
kernel-tools-libs-devel-3.10.0-123.9.2.el7.x86_64.rpm | 9d197abac406851f5fdb927254603280 | ELBA-2021-1397-1 | |
perf-3.10.0-123.9.2.el7.x86_64.rpm | 1336f92f68b5b9974310d66554fab61d | ELSA-2021-9220 | |
python-perf-3.10.0-123.9.2.el7.x86_64.rpm | a70f2f7b968e0763a8afb1c7b74d8aeb | ELSA-2021-9220 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team