ELSA-2016-3644

ELSA-2016-3644 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2016-11-20

Description


kernel-uek
[4.1.12-61.1.19]
- acpi: Disable ACPI table override if securelevel is set (Linn Crosetto) [Orabug: 25058966] {CVE-2016-3699}
- aacraid: Check size values after double-fetch from user (Dave Carroll) [Orabug: 25060060] {CVE-2016-6480} {CVE-2016-6480}
- audit: fix a double fetch in audit_log_single_execve_arg() (Paul Moore) [Orabug: 25059969] {CVE-2016-6136}
- ecryptfs: don't allow mmap when the lower fs doesn't support it (Jeff Mahoney) [Orabug: 25023269] {CVE-2016-1583} {CVE-2016-1583}
- Revert 'ecryptfs: forbid opening files without mmap handler' (Chuck Anderson) [Orabug: 24971921] {CVE-2016-1583}
- percpu: fix synchronization between synchronous map extension and chunk destruction (Tejun Heo) [Orabug: 25060084] {CVE-2016-4794}
- percpu: fix synchronization between chunk->map_extend_work and chunk destruction (Tejun Heo) [Orabug: 25060084] {CVE-2016-4794}
- ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt (Kangjie Lu) [Orabug: 25059898] {CVE-2016-4578}
- ALSA: timer: Fix leak in events via snd_timer_user_ccallback (Kangjie Lu) [Orabug: 25059898] {CVE-2016-4578}
- ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (Kangjie Lu) [Orabug: 25059752] {CVE-2016-4569}
- Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (Jaganath Kanakkassery) [Orabug: 25058894] {CVE-2015-8956}
- ASN.1: Fix non-match detection failure on data overrun (David Howells) [Orabug: 25059037] {CVE-2016-2053}
- mm: migrate dirty page without clear_page_dirty_for_io etc (Hugh Dickins) [Orabug: 25059188] {CVE-2016-3070}

[4.1.12-61.1.18]
- uek-rpm ol7: change uek-rpm/ol7/update-el release value from 7.1 to 7.3 (Chuck Anderson) [Orabug: 25050614]


Related CVEs


CVE-2016-1583
CVE-2015-8956
CVE-2016-2053
CVE-2016-4569
CVE-2016-4578
CVE-2016-6480
CVE-2016-3070
CVE-2016-3699
CVE-2016-4794
CVE-2016-6136

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) dtrace-modules-4.1.12-61.1.19.el6uek-0.5.3-2.el6.src.rpm0ef648774db84c245716e73906e07c2e-
kernel-uek-4.1.12-61.1.19.el6uek.src.rpm4a0c60579e53656e4d111fa0d6638050ELSA-2021-9215
dtrace-modules-4.1.12-61.1.19.el6uek-0.5.3-2.el6.x86_64.rpm8db3038bd71debd6da47b72cba93004f-
kernel-uek-4.1.12-61.1.19.el6uek.x86_64.rpm312b3323d4104e9d09959c952779e893ELSA-2021-9215
kernel-uek-debug-4.1.12-61.1.19.el6uek.x86_64.rpmb87302a031996772734f1bbb2b54430fELSA-2021-9215
kernel-uek-debug-devel-4.1.12-61.1.19.el6uek.x86_64.rpmb87668134fdd1641a2159312d27994beELSA-2021-9215
kernel-uek-devel-4.1.12-61.1.19.el6uek.x86_64.rpmfd0b8aefafc537e5a52af2730a28a27dELSA-2021-9215
kernel-uek-doc-4.1.12-61.1.19.el6uek.noarch.rpm389c212c7ff970d042db3c6b0c9df94eELSA-2021-9215
kernel-uek-firmware-4.1.12-61.1.19.el6uek.noarch.rpm48536d582643057cecedf0746afe5506ELSA-2021-9215
Oracle Linux 7 (x86_64) dtrace-modules-4.1.12-61.1.19.el7uek-0.5.3-2.el7.src.rpm14fd35c7874d8c0bd1e98cf43e176210-
kernel-uek-4.1.12-61.1.19.el7uek.src.rpmb55327e4ff76e4252ad4a3121b7114dfELSA-2021-9220
dtrace-modules-4.1.12-61.1.19.el7uek-0.5.3-2.el7.x86_64.rpm8127297da14b81deccbf3166ba674aa9-
kernel-uek-4.1.12-61.1.19.el7uek.x86_64.rpm4e9358acadee8264a4181ae10e752de3ELSA-2021-9220
kernel-uek-debug-4.1.12-61.1.19.el7uek.x86_64.rpm168e38406dd7b91ee7dbf526c1d6061dELSA-2021-9220
kernel-uek-debug-devel-4.1.12-61.1.19.el7uek.x86_64.rpm568662b9cc63d5eb4ec0e9a794d145a1ELSA-2021-9220
kernel-uek-devel-4.1.12-61.1.19.el7uek.x86_64.rpmd1c0dfce4f4542207419cb71d7d1ad0dELSA-2021-9220
kernel-uek-doc-4.1.12-61.1.19.el7uek.noarch.rpmc75ac7ecde4483abe6c0d6953cd0103eELSA-2021-9220
kernel-uek-firmware-4.1.12-61.1.19.el7uek.noarch.rpm01d6a0c157983c87b2412b55dc2fd401ELSA-2021-9215



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete