Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2020-07-08 |
[4.1.12-124.40.6]
- ipv4: ipv4_default_advmss() should use route mtu (Eric Dumazet) [Orabug: 31563095]
- net: ipv4: Refine the ipv4_default_advmss (Gao Feng) [Orabug: 31563095]
[4.1.12-124.40.5]
- Revert 'bnxt_en: Remove busy poll logic in the driver.' (Brian Maly) [Orabug: 28151475]
- md: batch flush requests. (NeilBrown) [Orabug: 31332821]
- ALSA: core: Fix card races between register and disconnect (Takashi Iwai) [Orabug: 31351891] {CVE-2019-15214}
- media: dvb-usb-v2: lmedm04: move ts2020 attach to dm04_lme2510_tuner (Malcolm Priestley) [Orabug: 31352061] {CVE-2017-16538}
- media: dvb-usb-v2: lmedm04: Improve logic checking of warm start (Malcolm Priestley) [Orabug: 31352061] {CVE-2017-16538}
- atomic_open(): fix the handling of create_error (Al Viro) [Orabug: 31493395]
[4.1.12-124.40.4]
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (Tomas Bortoli) [Orabug: 31351119] {CVE-2019-19533}
- NFS: Fix a performance regression in readdir (Trond Myklebust) [Orabug: 31409061]
[4.1.12-124.40.3]
- x86/speculation: Add Ivy Bridge to affected list (Josh Poimboeuf) [Orabug: 31475612] {CVE-2020-0543}
- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31475612] {CVE-2020-0543}
- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31475612] {CVE-2020-0543}
- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31475612] {CVE-2020-0543}
- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31475612] {CVE-2020-0543}
- x86/cpu: Rename cpu_data.x86_mask to cpu_data.x86_stepping (Jia Zhang) [Orabug: 31475612] {CVE-2020-0543}
[4.1.12-124.40.2]
- MCE: Restrict MCE banks to 6 on AMD platform (Zhenzhong Duan) [Orabug: 30000521]
- can: peak_usb: fix slab info leak (Johan Hovold) [Orabug: 31351141] {CVE-2019-19534}
- can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices (Tomas Bortoli) [Orabug: 31351250] {CVE-2019-19536}
- xfs: fix freeze hung (Junxiao Bi) [Orabug: 31430876]
[4.1.12-124.40.1]
- iscsi_target: fix mismatch spinlock unlock (Junxiao Bi) [Orabug: 31202372]
CVE-2019-19534 |
CVE-2020-0543 |
CVE-2019-15214 |
CVE-2019-19533 |
CVE-2017-16538 |
CVE-2019-19536 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-124.40.6.el6uek.src.rpm | 81bedb2181b515c3deb7dbccd06f5144 | ELSA-2021-9215 |
kernel-uek-4.1.12-124.40.6.el6uek.x86_64.rpm | 67d0f9ebaa0303b2ddd4e6c97a210eff | ELSA-2021-9215 | |
kernel-uek-debug-4.1.12-124.40.6.el6uek.x86_64.rpm | f4b863f8dfb8714ad87b57f0864dda28 | ELSA-2021-9215 | |
kernel-uek-debug-devel-4.1.12-124.40.6.el6uek.x86_64.rpm | 6807157cda791762a1ca6ecb7b3a51d6 | ELSA-2021-9215 | |
kernel-uek-devel-4.1.12-124.40.6.el6uek.x86_64.rpm | b01de510fc4dd59ce9f4ce8a0e7e4a15 | ELSA-2021-9215 | |
kernel-uek-doc-4.1.12-124.40.6.el6uek.noarch.rpm | 632bbab0823a9c90e5d167c4ea84753e | ELSA-2021-9215 | |
kernel-uek-firmware-4.1.12-124.40.6.el6uek.noarch.rpm | b77e6dd1eddab35908beefc396107833 | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | kernel-uek-4.1.12-124.40.6.el7uek.src.rpm | e59c56edf669415c04a79d96bb65fb1e | ELSA-2021-9220 |
kernel-uek-4.1.12-124.40.6.el7uek.x86_64.rpm | e46cb25b99377a764b9405bff4cc0167 | ELSA-2021-9220 | |
kernel-uek-debug-4.1.12-124.40.6.el7uek.x86_64.rpm | f4012346799f856e9786137b29b4de24 | ELSA-2021-9220 | |
kernel-uek-debug-devel-4.1.12-124.40.6.el7uek.x86_64.rpm | f90c399135d08cadbae579cb4705bdb6 | ELSA-2021-9220 | |
kernel-uek-devel-4.1.12-124.40.6.el7uek.x86_64.rpm | a74bfa277cb99c8829e07846e32aea23 | ELSA-2021-9220 | |
kernel-uek-doc-4.1.12-124.40.6.el7uek.noarch.rpm | 8f87d478ebd5cc214800614e0d02fc4a | ELSA-2021-9220 | |
kernel-uek-firmware-4.1.12-124.40.6.el7uek.noarch.rpm | ebcddfcb4544c7d181abca96522a96b1 | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team