Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2020-06-03 |
[4.1.12-124.39.5]
- Input: ff-memless - kill timer in destroy() (Oliver Neukum) [Orabug: 31213691] {CVE-2019-19524}
- libertas: Fix two buffer overflows at parsing bss descriptor (Wen Huang) [Orabug: 31351307] {CVE-2019-14896} {CVE-2019-14897} {CVE-2019-14897}
- binfmt_elf: use ELF_ET_DYN_BASE only for PIE (Kees Cook) [Orabug: 31352068] {CVE-2017-1000370} {CVE-2017-1000371} {CVE-2017-1000370}
- NFSv4.0: Remove transport protocol name from non-UCS client ID (Chuck Lever) [Orabug: 31357212]
- NFSv4.0: Remove cl_ipaddr from non-UCS client ID (Chuck Lever) [Orabug: 31357212]
- xen/manage: enable C_A_D to force reboot (Dongli Zhang) [Orabug: 31387466]
[4.1.12-124.39.4]
- acpi: disable erst (Wengang Wang) [Orabug: 31194253]
- mdio_bus: Fix use-after-free on device_register fails (YueHaibing) [Orabug: 31222292] {CVE-2019-12819}
- rds: ib: Fix dysfunctional long address resolve timeout (Hakon Bugge) [Orabug: 31302708]
- vxlan: dont migrate permanent fdb entries during learn (Roopa Prabhu) [Orabug: 31325318]
- USB: iowarrior: fix use-after-free on disconnect (Johan Hovold) [Orabug: 31351061] {CVE-2019-19528}
- usb: iowarrior: fix deadlock on disconnect (Oliver Neukum) [Orabug: 31351061] {CVE-2019-19528}
- mremap: properly flush TLB before releasing the page (Linus Torvalds) [Orabug: 31352011] {CVE-2018-18281}
[4.1.12-124.39.3]
- Input: add safety guards to input_set_keycode() (Dmitry Torokhov) [Orabug: 31200558] {CVE-2019-20636}
- media: stv06xx: add missing descriptor sanity checks (Johan Hovold) [Orabug: 31200579] {CVE-2020-11609}
- media: ov519: add missing endpoint sanity checks (Johan Hovold) [Orabug: 31213758] {CVE-2020-11608}
- media: xirlink_cit: add missing descriptor sanity checks (Johan Hovold) [Orabug: 31213767] {CVE-2020-11668}
- mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring (Navid Emamdoost) [Orabug: 31263147] {CVE-2019-19057}
- USB: core: Fix races in character device registration and deregistraion (Alan Stern) [Orabug: 31317667] {CVE-2019-19537}
CVE-2018-18281 |
CVE-2020-11608 |
CVE-2020-11609 |
CVE-2020-11668 |
CVE-2017-1000370 |
CVE-2019-14897 |
CVE-2019-19524 |
CVE-2019-19528 |
CVE-2019-19537 |
CVE-2019-20636 |
CVE-2019-12819 |
CVE-2019-19057 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-124.39.5.el6uek.src.rpm | 8ab62898e7f4594b63c296c95efe1f0f | ELSA-2021-9215 |
kernel-uek-4.1.12-124.39.5.el6uek.x86_64.rpm | 5d7a892e29dbccae54d727a14783621a | ELSA-2021-9215 | |
kernel-uek-debug-4.1.12-124.39.5.el6uek.x86_64.rpm | 3357a510d33b5a68a56eb1a2e3cfb7bb | ELSA-2021-9215 | |
kernel-uek-debug-devel-4.1.12-124.39.5.el6uek.x86_64.rpm | 24ec1a4bcd5011064ae3408c4cba8b8d | ELSA-2021-9215 | |
kernel-uek-devel-4.1.12-124.39.5.el6uek.x86_64.rpm | 5572fcdf19597eb403b526b8f6f671fe | ELSA-2021-9215 | |
kernel-uek-doc-4.1.12-124.39.5.el6uek.noarch.rpm | 97c6994342359240d1693b80d8d2388f | ELSA-2021-9215 | |
kernel-uek-firmware-4.1.12-124.39.5.el6uek.noarch.rpm | 2bb7e0d3e84428b5ce4afaf7406aee43 | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | kernel-uek-4.1.12-124.39.5.el7uek.src.rpm | 4d7c35271d2ae05385e9e9d795a50743 | ELSA-2021-9220 |
kernel-uek-4.1.12-124.39.5.el7uek.x86_64.rpm | 64a6645b998b1e940d5e6529a14a0870 | ELSA-2021-9220 | |
kernel-uek-debug-4.1.12-124.39.5.el7uek.x86_64.rpm | bce0068c042cbf0af3af4b97865bc014 | ELSA-2021-9220 | |
kernel-uek-debug-devel-4.1.12-124.39.5.el7uek.x86_64.rpm | 40b551955622866563b7603ab0ab2277 | ELSA-2021-9220 | |
kernel-uek-devel-4.1.12-124.39.5.el7uek.x86_64.rpm | 7da696606f8356e647a769d68e9c41d2 | ELSA-2021-9220 | |
kernel-uek-doc-4.1.12-124.39.5.el7uek.noarch.rpm | de928fe5133bbaad693ca2ee94177840 | ELSA-2021-9220 | |
kernel-uek-firmware-4.1.12-124.39.5.el7uek.noarch.rpm | 55f796633e86fab182df01e921303a3b | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team