ELSA-2015-1778

ELSA-2015-1778 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2015-09-15

Description


[3.10.0-229.14.1.OL7]
- Oracle Linux certificates (Alexey Petrenko)

[3.10.0-229.14.1]
- [s390] zcrypt: Fixed reset and interrupt handling of AP queues (Hendrik Brueckner) [1248381 1238230]

[3.10.0-229.13.1]
- [dma] ioat: fix tasklet tear down (Herton R. Krzesinski) [1251523 1210093]
- [drm] radeon: Fix VGA switcheroo problem related to hotplug (missing hunk) (Rob Clark) [1207879 1223472]
- [security] keys: Ensure we free the assoc array edit if edit is valid (David Howells) [1246039 1244171] {CVE-2015-1333}
- [net] tcp: properly handle stretch acks in slow start (Florian Westphal) [1243903 1151756]
- [net] tcp: fix no cwnd growth after timeout (Florian Westphal) [1243903 1151756]
- [net] tcp: increase throughput when reordering is high (Florian Westphal) [1243903 1151756]
- [of] Fix sysfs_dirent cache integrity issue (Gustavo Duarte) [1249120 1225539]
- [tty] vt: don't set font mappings on vc not supporting this (Jarod Wilson) [1248384 1213538]
- [scsi] fix regression in scsi_send_eh_cmnd() (Ewan Milne) [1243412 1167454]
- [net] udp: fix behavior of wrong checksums (Denys Vlasenko) [1240760 1240761] {CVE-2015-5364 CVE-2015-5366}
- [fs] Convert MessageID in smb2_hdr to LE (Sachin Prabhu) [1238693 1161441]
- [x86] bpf_jit: fix compilation of large bpf programs (Denys Vlasenko) [1236938 1236939] {CVE-2015-4700}
- [net] sctp: fix ASCONF list handling (Marcelo Leitner) [1227960 1206474] {CVE-2015-3212}
- [fs] ext4: allocate entire range in zero range (Lukas Czerner) [1193909 1187071] {CVE-2015-0275}
- [x86] ASLR bruteforce possible for vdso library (Jacob Tanenbaum) [1184898 1184899] {CVE-2014-9585}

[3.10.0-229.12.1]
- [ethernet] ixgbe: remove CIAA/D register reads from bad VF check (John Greene) [1245597 1205903]
- [kernel] sched: Avoid throttle_cfs_rq() racing with period_timer stopping (Rik van Riel) [1241078 1236413]


Related CVEs


CVE-2015-0275
CVE-2015-5366
CVE-2015-1333
CVE-2015-3212
CVE-2015-5364
CVE-2015-4700
CVE-2014-9585

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-3.10.0-229.14.1.el7.src.rpmd3d7605f9e48a9f7f0b586c7a483f248b2f8355dce6cc09a5b6e4a21a38e057dELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-229.14.1.el7.src.rpmd3d7605f9e48a9f7f0b586c7a483f248b2f8355dce6cc09a5b6e4a21a38e057dELSA-2025-1281ol7_x86_64_optional_archive
kernel-3.10.0-229.14.1.el7.src.rpmd3d7605f9e48a9f7f0b586c7a483f248b2f8355dce6cc09a5b6e4a21a38e057dELSA-2025-1281ol7_x86_64_u1_patch
kernel-3.10.0-229.14.1.el7.x86_64.rpmb802c9702ba3db2750e44e3a59665808d9596d8541431e99d6a28f1997498513ELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-229.14.1.el7.x86_64.rpmb802c9702ba3db2750e44e3a59665808d9596d8541431e99d6a28f1997498513ELSA-2025-1281ol7_x86_64_u1_patch
kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm6ecde38134d21bace7c0ac975b4cdba6e892a5ac05a8287f6aba18c2c331804cELSA-2025-1281ol7_x86_64_latest_archive
kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm6ecde38134d21bace7c0ac975b4cdba6e892a5ac05a8287f6aba18c2c331804cELSA-2025-1281ol7_x86_64_u1_patch
kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm1e086509e34847b20c86ca96fc80bf99eee5e2f5a21e2ef8d38ae88820964fcfELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm1e086509e34847b20c86ca96fc80bf99eee5e2f5a21e2ef8d38ae88820964fcfELSA-2025-1281ol7_x86_64_u1_patch
kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpmd6f32cc35202fab74d247bab6073ed7b3551b4dc7f2948045c2c2a7a74dd2394ELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpmd6f32cc35202fab74d247bab6073ed7b3551b4dc7f2948045c2c2a7a74dd2394ELSA-2025-1281ol7_x86_64_u1_patch
kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm87204cb45c22e5a90e561189e6bdf0366ab747d7eedaf90ef8cd841b67988beeELSA-2025-1281ol7_x86_64_latest_archive
kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm87204cb45c22e5a90e561189e6bdf0366ab747d7eedaf90ef8cd841b67988beeELSA-2025-1281ol7_x86_64_u1_patch
kernel-doc-3.10.0-229.14.1.el7.noarch.rpm56cd4ee8f5e16aa3148a92bad5648c9885b0cba865f7581aaa96b58fd37dea7eELSA-2025-1281ol7_x86_64_optional_archive
kernel-headers-3.10.0-229.14.1.el7.x86_64.rpmf5124815633b2894011e661332699f67081cf72b7ae124edbdd60538a069b35dELSA-2025-1281ol7_x86_64_latest_archive
kernel-headers-3.10.0-229.14.1.el7.x86_64.rpmf5124815633b2894011e661332699f67081cf72b7ae124edbdd60538a069b35dELSA-2025-1281ol7_x86_64_u1_patch
kernel-tools-3.10.0-229.14.1.el7.x86_64.rpme5897c6de4b87856bcf0a591919ddcc4d6c89f4d2fee321ddeeaaaf1b06fbf47ELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-3.10.0-229.14.1.el7.x86_64.rpme5897c6de4b87856bcf0a591919ddcc4d6c89f4d2fee321ddeeaaaf1b06fbf47ELSA-2025-1281ol7_x86_64_u1_patch
kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm5174ee2b82052c6a1a7042b033b01b3ed09efc8461cb405d158cff3780ff395fELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm5174ee2b82052c6a1a7042b033b01b3ed09efc8461cb405d158cff3780ff395fELSA-2025-1281ol7_x86_64_u1_patch
kernel-tools-libs-devel-3.10.0-229.14.1.el7.x86_64.rpmc4c3644aa198cf1cb4504b66f70dbc1e9bb35711192e4e80117e4f22b7f3349aELSA-2025-1281ol7_x86_64_optional_archive
perf-3.10.0-229.14.1.el7.x86_64.rpmd9a16a539e7fd78d5c751dbe574356aed74dbf26742ea8e0106cde82d5db7a51ELSA-2025-20019ol7_x86_64_latest_archive
perf-3.10.0-229.14.1.el7.x86_64.rpmd9a16a539e7fd78d5c751dbe574356aed74dbf26742ea8e0106cde82d5db7a51ELSA-2025-20019ol7_x86_64_u1_patch
python-perf-3.10.0-229.14.1.el7.x86_64.rpm6b123a4126bfd4ddd8d388076b15a8b71ad650a23056e6876e3f32b867446e8aELSA-2025-20019ol7_x86_64_optional_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete