ELSA-2016-0185

ELSA-2016-0185 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-02-16

Description


- [3.10.0-327.10.1.OL7]
- Oracle Linux certificates (Alexey Petrenko)

[3.10.0-327.10.1]
- [of] return NUMA_NO_NODE from fallback of_node_to_nid() (Thadeu Lima de Souza Cascardo) [1300614 1294398]
- [net] openvswitch: do not allocate memory from offline numa node (Thadeu Lima de Souza Cascardo) [1300614 1294398]

[3.10.0-327.9.1]
- [security] keys: Fix keyring ref leak in join_session_keyring() (David Howells) [1298931 1298036] {CVE-2016-0728}

[3.10.0-327.8.1]
- [md] dm: fix AB-BA deadlock in __dm_destroy() (Mike Snitzer) [1296566 1292481]
- [md] revert 'dm-mpath: fix stalls when handling invalid ioctls' (Mike Snitzer) [1287552 1277194]
- [cpufreq] intel_pstate: Fix limits->max_perf rounding error (Prarit Bhargava) [1296276 1279617]
- [cpufreq] intel_pstate: Fix limits->max_policy_pct rounding error (Prarit Bhargava) [1296276 1279617]
- [cpufreq] revert 'intel_pstate: fix rounding error in max_freq_pct' (Prarit Bhargava) [1296276 1279617]
- [crypto] nx: 842 - Add CRC and validation support (Gustavo Duarte) [1289451 1264905]
- [powerpc] eeh: More relaxed condition for enabled IO path (Steve Best) [1289101 1274731]
- [security] keys: Don't permit request_key() to construct a new keyring (David Howells) [1275929 1273465] {CVE-2015-7872}
- [security] keys: Fix crash when attempt to garbage collect an uninstantiated keyring (David Howells) [1275929 1273465] {CVE-2015-7872}
- [security] keys: Fix race between key destruction and finding a keyring by name (David Howells) [1275929 1273465] {CVE-2015-7872}
- [x86] paravirt: Replace the paravirt nop with a bona fide empty function (Mateusz Guzik) [1259582 1259583] {CVE-2015-5157}
- [x86] nmi: Fix a paravirt stack-clobbering bug in the NMI code (Mateusz Guzik) [1259582 1259583] {CVE-2015-5157}
- [x86] nmi: Use DF to avoid userspace RSP confusing nested NMI detection (Mateusz Guzik) [1259582 1259583] {CVE-2015-5157}
- [x86] nmi: Reorder nested NMI checks (Mateusz Guzik) [1259582 1259583] {CVE-2015-5157}
- [x86] nmi: Improve nested NMI comments (Mateusz Guzik) [1259582 1259583] {CVE-2015-5157}
- [x86] nmi: Switch stacks on userspace NMI entry (Mateusz Guzik) [1259582 1259583] {CVE-2015-5157}

[3.10.0-327.7.1]
- [scsi] scsi_sysfs: protect against double execution of __scsi_remove_device() (Vitaly Kuznetsov) [1292075 1273723]
- [powerpc] mm: Recompute hash value after a failed update (Gustavo Duarte) [1289452 1264920]
- [misc] genwqe: get rid of atomic allocations (Hendrik Brueckner) [1289450 1270244]
- [mm] use only per-device readahead limit (Eric Sandeen) [1287550 1280355]
- [net] ipv6: update ip6_rt_last_gc every time GC is run (Hannes Frederic Sowa) [1285370 1270092]
- [kernel] tick: broadcast: Prevent livelock from event handler (Prarit Bhargava) [1284043 1265283]
- [kernel] clockevents: Serialize calls to clockevents_update_freq() in the core (Prarit Bhargava) [1284043 1265283]

[3.10.0-327.6.1]
- [netdrv] bonding: propagate LRO disable to slave devices (Jarod Wilson) [1292072 1266578]

[3.10.0-327.5.1]
- [net] vsock: Fix lockdep issue (Dave Anderson) [1292372 1253971]
- [net] vsock: sock_put wasn't safe to call in interrupt context (Dave Anderson) [1292372 1253971]


Related CVEs


CVE-2015-5157
CVE-2015-7872

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-3.10.0-327.10.1.el7.src.rpm50dc55aaedceeedf57590e2a151634fdb76b29e277facf4a6e833633f1bc0931ELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-327.10.1.el7.src.rpm50dc55aaedceeedf57590e2a151634fdb76b29e277facf4a6e833633f1bc0931ELSA-2025-1281ol7_x86_64_optional_archive
kernel-3.10.0-327.10.1.el7.src.rpm50dc55aaedceeedf57590e2a151634fdb76b29e277facf4a6e833633f1bc0931ELSA-2025-1281ol7_x86_64_u2_patch
kernel-3.10.0-327.10.1.el7.x86_64.rpm8cb132b399aa5fdb38a13c0cfe6f0f2f4921aa6a1f5ac7eeb77938c94e0f180eELSA-2025-1281ol7_x86_64_latest_archive
kernel-3.10.0-327.10.1.el7.x86_64.rpm8cb132b399aa5fdb38a13c0cfe6f0f2f4921aa6a1f5ac7eeb77938c94e0f180eELSA-2025-1281ol7_x86_64_u2_patch
kernel-abi-whitelists-3.10.0-327.10.1.el7.noarch.rpm1bf091992053e29d18b9f9183790b9246a64d066a6445727502b4c400eb5efd6ELSA-2025-1281ol7_x86_64_latest_archive
kernel-abi-whitelists-3.10.0-327.10.1.el7.noarch.rpm1bf091992053e29d18b9f9183790b9246a64d066a6445727502b4c400eb5efd6ELSA-2025-1281ol7_x86_64_u2_patch
kernel-debug-3.10.0-327.10.1.el7.x86_64.rpm21d0d746185db9f1db3919609cb8ead77cf30a7a59c4a65915755d4263515b2fELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-3.10.0-327.10.1.el7.x86_64.rpm21d0d746185db9f1db3919609cb8ead77cf30a7a59c4a65915755d4263515b2fELSA-2025-1281ol7_x86_64_u2_patch
kernel-debug-devel-3.10.0-327.10.1.el7.x86_64.rpmf754b5df0ed1941ff53e75cfaaeb4dbe7907757cd381440556e3d84c32b6356dELSA-2025-1281ol7_x86_64_latest_archive
kernel-debug-devel-3.10.0-327.10.1.el7.x86_64.rpmf754b5df0ed1941ff53e75cfaaeb4dbe7907757cd381440556e3d84c32b6356dELSA-2025-1281ol7_x86_64_u2_patch
kernel-devel-3.10.0-327.10.1.el7.x86_64.rpm09b60d6b4819abe50a9acd93349e4f886775d116406c0e7380553bbed57eb2faELSA-2025-1281ol7_x86_64_latest_archive
kernel-devel-3.10.0-327.10.1.el7.x86_64.rpm09b60d6b4819abe50a9acd93349e4f886775d116406c0e7380553bbed57eb2faELSA-2025-1281ol7_x86_64_u2_patch
kernel-doc-3.10.0-327.10.1.el7.noarch.rpm6f1ef0128c6bbf9fe296effd162f16153dc14374979755a6614caffcdd043b7eELSA-2025-1281ol7_x86_64_optional_archive
kernel-headers-3.10.0-327.10.1.el7.x86_64.rpm4c8d0b6889bac310229a31c303fe15bdbf573581c573ceb1a30d68e1ddaf75e9ELSA-2025-1281ol7_x86_64_latest_archive
kernel-headers-3.10.0-327.10.1.el7.x86_64.rpm4c8d0b6889bac310229a31c303fe15bdbf573581c573ceb1a30d68e1ddaf75e9ELSA-2025-1281ol7_x86_64_u2_patch
kernel-tools-3.10.0-327.10.1.el7.x86_64.rpmc081a1d119b992e2e7d2c48d8aaf798a0d5079b44d8014d094bb62016929e058ELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-3.10.0-327.10.1.el7.x86_64.rpmc081a1d119b992e2e7d2c48d8aaf798a0d5079b44d8014d094bb62016929e058ELSA-2025-1281ol7_x86_64_u2_patch
kernel-tools-libs-3.10.0-327.10.1.el7.x86_64.rpm85988f7d86ce8db4867c9b2162b520c5f477a4b6d933cdf9993d3fc29eddf78aELSA-2025-1281ol7_x86_64_latest_archive
kernel-tools-libs-3.10.0-327.10.1.el7.x86_64.rpm85988f7d86ce8db4867c9b2162b520c5f477a4b6d933cdf9993d3fc29eddf78aELSA-2025-1281ol7_x86_64_u2_patch
kernel-tools-libs-devel-3.10.0-327.10.1.el7.x86_64.rpmc40da4ef3a43554531912eea0c188c5bc11e0cddbe4b87a3607542e700ee620fELSA-2025-1281ol7_x86_64_optional_archive
perf-3.10.0-327.10.1.el7.x86_64.rpm58459581c09f367941d69f2c069528beda8dda5876561c4f0dd8f46bd56b9c43ELSA-2025-20019ol7_x86_64_latest_archive
perf-3.10.0-327.10.1.el7.x86_64.rpm58459581c09f367941d69f2c069528beda8dda5876561c4f0dd8f46bd56b9c43ELSA-2025-20019ol7_x86_64_u2_patch
python-perf-3.10.0-327.10.1.el7.x86_64.rpmf007e6fc835f7613cdb3368ad5fafce9415d36ccd2cb710b680e7f40f6780c1cELSA-2025-20019ol7_x86_64_latest_archive
python-perf-3.10.0-327.10.1.el7.x86_64.rpmf007e6fc835f7613cdb3368ad5fafce9415d36ccd2cb710b680e7f40f6780c1cELSA-2025-20019ol7_x86_64_u2_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete