Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2019-06-04 |
[4.1.12-124.28.1]
- hugetlbfs: don't retry when pool page allocations start to fail (Mike Kravetz) [Orabug: 29324267]
- x86/speculation: RSB stuffing with retpoline on Skylake+ cpus (William Roche) [Orabug: 29660924]
- x86/speculation: reformatting RSB overwrite macro (William Roche) [Orabug: 29660924]
- x86/speculation: Dynamic enable and disable of RSB stuffing with IBRS&!SMEP (William Roche) [Orabug: 29660924]
- x86/speculation: STUFF_RSB dynamic enable (William Roche) [Orabug: 29660924]
- int3 handler better address space detection on interrupts (William Roche) [Orabug: 29660924]
- repairing out-of-tree build functionality (Mark Nicholson) [Orabug: 29755100]
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (Shuning Zhang) [Orabug: 29797007]
[4.1.12-124.27.3]
- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (Shuning Zhang) [Orabug: 29233739]
- Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer (Marcel Holtmann) [Orabug: 29526426] {CVE-2019-3459}
- Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt (Marcel Holtmann) [Orabug: 29526426] {CVE-2019-3459}
- HID: debug: fix the ring buffer implementation (Vladis Dronov) [Orabug: 29629481] {CVE-2019-3819} {CVE-2019-3819}
- scsi: target: iscsi: Use hex2bin instead of a re-implementation (Vincent Pelletier) [Orabug: 29778875] {CVE-2018-14633} {CVE-2018-14633}
- scsi: libsas: fix a race condition when smp task timeout (Jason Yan) [Orabug: 29783225] {CVE-2018-20836}
- scsi: megaraid_sas: return error when create DMA pool failed (Jason Yan) [Orabug: 29783254] {CVE-2019-11810}
- Bluetooth: hidp: fix buffer overflow (Young Xiao) [Orabug: 29786786] {CVE-2011-1079} {CVE-2019-11884}
- x86/speculation/mds: Add 'mitigations=' support for MDS (Kanth Ghatraju) [Orabug: 29791046]
- net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock(). (Mao Wenan) [Orabug: 29802785] {CVE-2019-11815}
CVE-2018-14633 |
CVE-2018-20836 |
CVE-2019-11810 |
CVE-2019-11815 |
CVE-2019-11884 |
CVE-2019-3459 |
CVE-2019-3819 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-124.28.1.el6uek.src.rpm | ff7869f67390c59addcacb439298ec31 | ELSA-2021-9215 |
kernel-uek-4.1.12-124.28.1.el6uek.x86_64.rpm | 15d1a708bbae53de37b8e6e831b7d92b | ELSA-2021-9215 | |
kernel-uek-debug-4.1.12-124.28.1.el6uek.x86_64.rpm | 4b77480f447ca2463d3e8b9b8a734610 | ELSA-2021-9215 | |
kernel-uek-debug-devel-4.1.12-124.28.1.el6uek.x86_64.rpm | 5dc5f153622ed009b8af1343a60930cf | ELSA-2021-9215 | |
kernel-uek-devel-4.1.12-124.28.1.el6uek.x86_64.rpm | a335f92e9a1f4dd8a033efea554de27e | ELSA-2021-9215 | |
kernel-uek-doc-4.1.12-124.28.1.el6uek.noarch.rpm | c5e29f89b88c7e7ca873951bac1a3ef3 | ELSA-2021-9215 | |
kernel-uek-firmware-4.1.12-124.28.1.el6uek.noarch.rpm | c39014386611600d035ece09fa8115a9 | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | kernel-uek-4.1.12-124.28.1.el7uek.src.rpm | 4dc6d92877f2f0a5205ce082c2e0ac73 | ELSA-2021-9220 |
kernel-uek-4.1.12-124.28.1.el7uek.x86_64.rpm | 729d46c544599b398b53ac79a7c29c53 | ELSA-2021-9220 | |
kernel-uek-debug-4.1.12-124.28.1.el7uek.x86_64.rpm | aecc4aed5449fe8e88e4a87a1c1e2275 | ELSA-2021-9220 | |
kernel-uek-debug-devel-4.1.12-124.28.1.el7uek.x86_64.rpm | 67fe4f96881ca0487f48b59bf1d14833 | ELSA-2021-9220 | |
kernel-uek-devel-4.1.12-124.28.1.el7uek.x86_64.rpm | 23b2e4087f8742a857b0c095c11f64ee | ELSA-2021-9220 | |
kernel-uek-doc-4.1.12-124.28.1.el7uek.noarch.rpm | 4538ff0c3ec05d877a8d493106405a4e | ELSA-2021-9220 | |
kernel-uek-firmware-4.1.12-124.28.1.el7uek.noarch.rpm | 3a15dd9078c76bf3604d86c7e07cbe9c | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team