ELSA-2016-3502

ELSA-2016-3502 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2016-01-08

Description


[2.6.39-400.264.13]
- KEYS: Don't permit request_key() to construct a new keyring (David Howells) [Orabug: 22373449] {CVE-2015-7872}

[2.6.39-400.264.12]
- crypto: add missing crypto module aliases (Mathias Krause) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644}
- crypto: include crypto- module prefix in template (Kees Cook) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644}
- crypto: prefix module autoloading with 'crypto-' (Kees Cook) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644}

[2.6.39-400.264.11]
- KVM: x86: Don't report guest userspace emulation error to userspace (Nadav Amit) [Orabug: 22249615] {CVE-2010-5313} {CVE-2014-7842}

[2.6.39-400.264.9]
- msg_unlock() in wrong spot after applying 'Initialize msg/shm IPC objects before doing ipc_addid()' (Chuck Anderson) [Orabug: 22250044] {CVE-2015-7613} {CVE-2015-7613}

[2.6.39-400.264.8]
- ipc/sem.c: fully initialize sem_array before making it visible (Manfred Spraul) [Orabug: 22250044] {CVE-2015-7613}
- Initialize msg/shm IPC objects before doing ipc_addid() (Linus Torvalds) [Orabug: 22250044] {CVE-2015-7613}

[2.6.39-400.264.7]
- KVM: svm: unconditionally intercept #DB (Paolo Bonzini) [Orabug: 22333698] {CVE-2015-8104} {CVE-2015-8104}
- KVM: x86: work around infinite loop in microcode when #AC is delivered (Eric Northup) [Orabug: 22333689] {CVE-2015-5307} {CVE-2015-5307}

[2.6.39-400.264.6]
- mlx4_core: Introduce restrictions for PD update (Ajaykumar Hotchandani)
- IPoIB: Drop priv->lock before calling ipoib_send() (Wengang Wang)
- IPoIB: serialize changing on tx_outstanding (Wengang Wang) [Orabug: 21861366]
- IB/mlx4: Implement IB_QP_CREATE_USE_GFP_NOIO (Jiri Kosina)
- IB: Add a QP creation flag to use GFP_NOIO allocations (Or Gerlitz)
- IB: Return error for unsupported QP creation flags (Or Gerlitz)
- IB/ipoib: Calculate csum only when skb->ip_summed is CHECKSUM_PARTIAL (Yuval Shaia) [Orabug: 20873175]


Related CVEs


CVE-2014-7842
CVE-2015-7613
CVE-2015-8104
CVE-2014-9644
CVE-2015-5307
CVE-2013-7421

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-uek-2.6.39-400.264.13.el5uek.src.rpm4dfebccaa6a815aa342f31eba641b46eELSA-2020-5881
kernel-uek-2.6.39-400.264.13.el5uek.i686.rpm1cec225a3142270ac3af540fe8b8c1b2ELSA-2020-5881
kernel-uek-debug-2.6.39-400.264.13.el5uek.i686.rpm71a301637facaffb20b184d64890dc12ELSA-2020-5881
kernel-uek-debug-devel-2.6.39-400.264.13.el5uek.i686.rpm7b93662669a846c4b91e5acc93155842ELSA-2020-5881
kernel-uek-devel-2.6.39-400.264.13.el5uek.i686.rpmad68f6a54d43e1fa47110cae483058b5ELSA-2020-5881
kernel-uek-doc-2.6.39-400.264.13.el5uek.noarch.rpm968fa3ec6490f370ec4d37b719e082a0ELSA-2020-5881
kernel-uek-firmware-2.6.39-400.264.13.el5uek.noarch.rpme3f5a5b60092521d255097b3991e9c48ELSA-2020-5881
Oracle Linux 5 (x86_64) kernel-uek-2.6.39-400.264.13.el5uek.src.rpm4dfebccaa6a815aa342f31eba641b46eELSA-2020-5881
kernel-uek-2.6.39-400.264.13.el5uek.x86_64.rpm2434cc1c2ac26c0b8d6103b4409696d0ELSA-2020-5881
kernel-uek-debug-2.6.39-400.264.13.el5uek.x86_64.rpme038c3e779313a6f70753334e8b3fe72ELSA-2020-5881
kernel-uek-debug-devel-2.6.39-400.264.13.el5uek.x86_64.rpm2c04373370ea4fbb47b58affa82573b5ELSA-2020-5881
kernel-uek-devel-2.6.39-400.264.13.el5uek.x86_64.rpmbca60e96fd95fd4c22117b276d966074ELSA-2020-5881
kernel-uek-doc-2.6.39-400.264.13.el5uek.noarch.rpm968fa3ec6490f370ec4d37b719e082a0ELSA-2020-5881
kernel-uek-firmware-2.6.39-400.264.13.el5uek.noarch.rpme3f5a5b60092521d255097b3991e9c48ELSA-2020-5881
Oracle Linux 6 (i386) kernel-uek-2.6.39-400.264.13.el6uek.src.rpmf547b462d412019fc81ce8fc83f3fc64ELSA-2020-5866
kernel-uek-2.6.39-400.264.13.el6uek.i686.rpmb6a93ac60a3adac9ef13ee8359254037ELSA-2020-5866
kernel-uek-debug-2.6.39-400.264.13.el6uek.i686.rpmc498b5264d1b6ee03d8c0e2843802b80ELSA-2020-5866
kernel-uek-debug-devel-2.6.39-400.264.13.el6uek.i686.rpmea6511253392d905a2706eeba435021bELSA-2020-5866
kernel-uek-devel-2.6.39-400.264.13.el6uek.i686.rpm768129f2bd49921cdc9340ef4e8f43b6ELSA-2020-5866
kernel-uek-doc-2.6.39-400.264.13.el6uek.noarch.rpma7fb389c2e8280e782d70d860f1b7d10ELSA-2020-5866
kernel-uek-firmware-2.6.39-400.264.13.el6uek.noarch.rpm239054e6be80d270f23ef555497342c0ELSA-2020-5866
Oracle Linux 6 (x86_64) kernel-uek-2.6.39-400.264.13.el6uek.src.rpmf547b462d412019fc81ce8fc83f3fc64ELSA-2020-5866
kernel-uek-2.6.39-400.264.13.el6uek.x86_64.rpm1d55b18d60d16c3b65e4621ab6d8be0dELSA-2020-5866
kernel-uek-debug-2.6.39-400.264.13.el6uek.x86_64.rpm9ef0ef2457395164a63fce3f5d1469d0ELSA-2020-5866
kernel-uek-debug-devel-2.6.39-400.264.13.el6uek.x86_64.rpmea611407e1e3514d5f8a89bd466fbf62ELSA-2020-5866
kernel-uek-devel-2.6.39-400.264.13.el6uek.x86_64.rpmf2ca50dc5f2dfad2fcb705b2ccad7719ELSA-2020-5866
kernel-uek-doc-2.6.39-400.264.13.el6uek.noarch.rpma7fb389c2e8280e782d70d860f1b7d10ELSA-2020-5866
kernel-uek-firmware-2.6.39-400.264.13.el6uek.noarch.rpm239054e6be80d270f23ef555497342c0ELSA-2020-5866



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete