[El-errata] ELSA-2015-3032 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu Apr 23 14:07:08 PDT 2015
Oracle Linux Security Advisory ELSA-2015-3032
http://linux.oracle.com/errata/ELSA-2015-3032.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
i386:
x86_64:
kernel-uek-firmware-3.8.13-68.1.3.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-68.1.3.el7uek.noarch.rpm
kernel-uek-3.8.13-68.1.3.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-68.1.3.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-68.1.3.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-68.1.3.el7uek.x86_64.rpm
dtrace-modules-3.8.13-68.1.3.el7uek-0.4.3-4.el7.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-68.1.3.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-68.1.3.el7uek-0.4.3-4.el7.src.rpm
Description of changes:
kernel-uek
[3.8.13-68.1.3.el7uek]
- isofs: Fix unchecked printing of ER records (Jan Kara) [Orabug:
20930551] {CVE-2014-9584}
- KEYS: close race between key lookup and freeing (Sasha Levin)
[Orabug: 20930548] {CVE-2014-9529} {CVE-2014-9529}
- mm: memcg: do not allow task about to OOM kill to bypass the limit
(Johannes Weiner) [Orabug: 20930539] {CVE-2014-8171}
- mm: memcg: do not declare OOM from __GFP_NOFAIL allocations (Johannes
Weiner) [Orabug: 20930539] {CVE-2014-8171}
- fs: buffer: move allocation failure loop into the allocator (Johannes
Weiner) [Orabug: 20930539] {CVE-2014-8171}
- mm: memcg: handle non-error OOM situations more gracefully (Johannes
Weiner) [Orabug: 20930539] {CVE-2014-8171}
- mm: memcg: do not trap chargers with full callstack on OOM (Johannes
Weiner) [Orabug: 20930539] {CVE-2014-8171}
- mm: memcg: rework and document OOM waiting and wakeup (Johannes
Weiner) [Orabug: 20930539] {CVE-2014-8171}
- mm: memcg: enable memcg OOM killer only for user faults (Johannes
Weiner) [Orabug: 20930539] {CVE-2014-8171}
- x86: finish user fault error path with fatal signal (Johannes Weiner)
[Orabug: 20930539] {CVE-2014-8171}
- arch: mm: pass userspace fault flag to generic fault handler (Johannes
Weiner) [Orabug: 20930539] {CVE-2014-8171}
- selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
(Stephen Smalley) [Orabug: 20930501] {CVE-2014-3215}
More information about the El-errata
mailing list