[El-errata] ELSA-2015-3032 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Apr 23 14:07:08 PDT 2015


Oracle Linux Security Advisory ELSA-2015-3032

http://linux.oracle.com/errata/ELSA-2015-3032.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

i386:

x86_64:
kernel-uek-firmware-3.8.13-68.1.3.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-68.1.3.el7uek.noarch.rpm
kernel-uek-3.8.13-68.1.3.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-68.1.3.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-68.1.3.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-68.1.3.el7uek.x86_64.rpm
dtrace-modules-3.8.13-68.1.3.el7uek-0.4.3-4.el7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-68.1.3.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-68.1.3.el7uek-0.4.3-4.el7.src.rpm



Description of changes:

kernel-uek
[3.8.13-68.1.3.el7uek]
- isofs: Fix unchecked printing of ER records (Jan Kara)  [Orabug: 
20930551]  {CVE-2014-9584}
- KEYS: close race between key lookup and freeing (Sasha Levin) 
[Orabug: 20930548]  {CVE-2014-9529} {CVE-2014-9529}
- mm: memcg: do not allow task about to OOM kill to bypass the limit 
(Johannes Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- mm: memcg: do not declare OOM from __GFP_NOFAIL allocations (Johannes 
Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- fs: buffer: move allocation failure loop into the allocator (Johannes 
Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- mm: memcg: handle non-error OOM situations more gracefully (Johannes 
Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- mm: memcg: do not trap chargers with full callstack on OOM (Johannes 
Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- mm: memcg: rework and document OOM waiting and wakeup (Johannes 
Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- mm: memcg: enable memcg OOM killer only for user faults (Johannes 
Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- x86: finish user fault error path with fatal signal (Johannes Weiner) 
  [Orabug: 20930539]  {CVE-2014-8171}
- arch: mm: pass userspace fault flag to generic fault handler (Johannes 
Weiner)  [Orabug: 20930539]  {CVE-2014-8171}
- selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID. 
(Stephen Smalley)  [Orabug: 20930501]  {CVE-2014-3215}





More information about the El-errata mailing list