Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2019-09-04 |
[3.10.0-1062.1.1]
- Oracle Linux certificates (Alexey Petrenko)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
[3.10.0-1062.1.1]
- [fs] nfsv4.1: Avoid false retries when RPC calls are interrupted (Benjamin Coddington) [1739077 1732427]
- [fs] NFS4.1 handle interrupted slot reuse from ERR_DELAY (Benjamin Coddington) [1739077 1732427]
- [fs] nfsv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (Benjamin Coddington) [1739077 1732427]
- [fs] cifs: fix panic in smb2_reconnect (Leif Sahlberg) [1737382 1702264]
- [scsi] sg: protect against races between mmap() and SG_SET_RESERVED_SIZE (Ewan Milne) [1737380 1710533]
- [scsi] sg: recheck MMAP_IO request length with lock held (Ewan Milne) [1737380 1710533]
- [scsi] sg: reset 'res_in_use' after unlinking reserved array (Ewan Milne) [1737380 1710533]
- [scsi] sg: protect accesses to 'reserved' page array (Ewan Milne) [1737380 1710533]
- [netdrv] mlx4/en_netdev: allow offloading VXLAN over VLAN (Paolo Abeni) [1734333 1733671]
- [netdrv] brcmfmac: assure SSID length from firmware is limited (Stanislaw Gruszka) [1704879 1704880] {CVE-2019-9500}
- [net] tcp: be more careful in tcp_fragment() (Marcelo Leitner) [1739130 1732106]
- [documentation] Documentation: Add swapgs description to the Spectre v1 documentation (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [documentation] Documentation: Add section about CPU vulnerabilities for Spectre (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/speculation: Enable Spectre v1 swapgs mitigations (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations (Waiman Long) [1729810 1724510] {CVE-2019-1125}
- [x86] x86/feature: Relocate X86_FEATURE_INVPCID_SINGLE (Waiman Long) [1729810 1724510] {CVE-2019-1125}
CVE-2019-1125 |
CVE-2019-9500 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (x86_64) | kernel-3.10.0-1062.1.1.el7.src.rpm | d438a448b0e5ab896031a0447eb0a156 | ELBA-2021-1397-1 |
bpftool-3.10.0-1062.1.1.el7.x86_64.rpm | a37d1e4b9c7f6c13e6db92a0ca74be70 | ELBA-2021-1397-1 | |
kernel-3.10.0-1062.1.1.el7.x86_64.rpm | ba3d0ffe2eb14876708fb39ee8e16226 | ELBA-2021-1397-1 | |
kernel-abi-whitelists-3.10.0-1062.1.1.el7.noarch.rpm | c8d40181f0f6657b2e030eed923913eb | ELBA-2021-1397-1 | |
kernel-debug-3.10.0-1062.1.1.el7.x86_64.rpm | 8379ad5c1f071b1b4b4eb1d892ef737c | ELBA-2021-1397-1 | |
kernel-debug-devel-3.10.0-1062.1.1.el7.x86_64.rpm | 16583db0edf33b647d0508727f5c5a6a | ELBA-2021-1397-1 | |
kernel-devel-3.10.0-1062.1.1.el7.x86_64.rpm | bb05a523a7445697784c28d567c88537 | ELBA-2021-1397-1 | |
kernel-doc-3.10.0-1062.1.1.el7.noarch.rpm | 529971b327a9614bfd6d2e7acb315625 | ELBA-2021-1397-1 | |
kernel-headers-3.10.0-1062.1.1.el7.x86_64.rpm | 87b726fb744a3afefce9ca56852c5a81 | ELBA-2021-1397-1 | |
kernel-tools-3.10.0-1062.1.1.el7.x86_64.rpm | 6f795720ca8ae7f0262ca058616596b1 | ELBA-2021-1397-1 | |
kernel-tools-libs-3.10.0-1062.1.1.el7.x86_64.rpm | 26c648e88a67243cebe4d22446889429 | ELBA-2021-1397-1 | |
kernel-tools-libs-devel-3.10.0-1062.1.1.el7.x86_64.rpm | f4fa36a1ef9ddaef3b2a3396c82f098a | ELBA-2021-1397-1 | |
perf-3.10.0-1062.1.1.el7.x86_64.rpm | abf6b9c2d9c7b9876ac86bd5dead0ed9 | ELSA-2021-9220 | |
python-perf-3.10.0-1062.1.1.el7.x86_64.rpm | a8331289e027360795c18179bb7788c5 | ELSA-2021-9220 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team