ELSA-2016-3648

ELSA-2016-3648 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2016-12-07

Description


kernel-uek
[4.1.12-61.1.22]
- ocfs2: fix trans extend while free cached blocks (Junxiao Bi) [Orabug: 25136991]
- ocfs2: fix trans extend while flush truncate log (Junxiao Bi) [Orabug: 25136991]
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (Xue jiufei) [Orabug: 25136991]
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (Andrey Ryabinin) [Orabug: 25154096] {CVE-2016-8650} {CVE-2016-8650}
- mlx4: avoid multiple free on id_map_ent (Wengang Wang) [Orabug: 25159035]

[4.1.12-61.1.21]
- NVMe: reduce queue depth as workaround for Samsung EPIC SQ errata (Ashok Vairavan) [Orabug: 25144380]
- sctp: validate chunk len before actually using it (Marcelo Ricardo Leitner) [Orabug: 25142868] {CVE-2016-9555}

[4.1.12-61.1.20]
- rebuild bumping release


Related CVEs


CVE-2016-8650
CVE-2016-9555

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) dtrace-modules-4.1.12-61.1.22.el6uek-0.5.3-2.el6.src.rpm4e7e0789497d96a7d6cb6c4fc04d35b1-
kernel-uek-4.1.12-61.1.22.el6uek.src.rpm953b884a6f22629728730354ee712af2ELSA-2021-9215
dtrace-modules-4.1.12-61.1.22.el6uek-0.5.3-2.el6.x86_64.rpm98d5eedbb7270067f51c4a26bd3c9e52-
kernel-uek-4.1.12-61.1.22.el6uek.x86_64.rpmf400926a1b83b223d4bd8ca47f1cace2ELSA-2021-9215
kernel-uek-debug-4.1.12-61.1.22.el6uek.x86_64.rpm1fbfc603a0402a374cb563c92ef50180ELSA-2021-9215
kernel-uek-debug-devel-4.1.12-61.1.22.el6uek.x86_64.rpma5ab2905b6eeb01c693211f9bbafacadELSA-2021-9215
kernel-uek-devel-4.1.12-61.1.22.el6uek.x86_64.rpm4f0fc60891aa4eea16c9149de0cae048ELSA-2021-9215
kernel-uek-doc-4.1.12-61.1.22.el6uek.noarch.rpmaf717defe527be996a48be84e1da84fcELSA-2021-9215
kernel-uek-firmware-4.1.12-61.1.22.el6uek.noarch.rpmca2272f5252fd935cb99335243ecbf4eELSA-2021-9215
Oracle Linux 7 (x86_64) dtrace-modules-4.1.12-61.1.22.el7uek-0.5.3-2.el7.src.rpm0f970b27cafb427823e0d6396d528060-
kernel-uek-4.1.12-61.1.22.el7uek.src.rpm9419b28c470a2444ec906e95de314b7cELSA-2021-9220
dtrace-modules-4.1.12-61.1.22.el7uek-0.5.3-2.el7.x86_64.rpm6e2879265f89872f948f036e430ecde5-
kernel-uek-4.1.12-61.1.22.el7uek.x86_64.rpme90f6d775dd3c3e824e9674603a81e62ELSA-2021-9220
kernel-uek-debug-4.1.12-61.1.22.el7uek.x86_64.rpmc9a6dca7d5210aa2196805157b76646dELSA-2021-9220
kernel-uek-debug-devel-4.1.12-61.1.22.el7uek.x86_64.rpm3d99af9795742030cbf55542b6cdb9e2ELSA-2021-9220
kernel-uek-devel-4.1.12-61.1.22.el7uek.x86_64.rpm43d15513bc0df45163fd6b2cf308cdf2ELSA-2021-9220
kernel-uek-doc-4.1.12-61.1.22.el7uek.noarch.rpmf3ad3c10dbdac00b3ae2af7d54c7a574ELSA-2021-9220
kernel-uek-firmware-4.1.12-61.1.22.el7uek.noarch.rpm3152659eabf45cf8bdcc65d62387346fELSA-2021-9215



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete