ELSA-2016-3651

ELSA-2016-3651 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-12-09

Description


kernel-uek
[3.8.13-118.15.1]
- Revert 'i40e: Set defport behavior for the Main VSI when in promiscuous mode' (Jack Vogel) [Orabug: 22683573]
- mlx4: avoid multiple free on id_map_ent (Wengang Wang)
- xen-netfront: cast grant table reference first to type int (Dongli Zhang)
- xen-netfront: do not cast grant table reference to signed short (Dongli Zhang)
- RDS: Drop the connection as part of cancel to avoid hangs (Avinash Repaka) [Orabug: 25045360]
- sctp: validate chunk len before actually using it (Marcelo Ricardo Leitner) [Orabug: 25142879] {CVE-2016-9555}
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (Andrey Ryabinin) [Orabug: 25154098] {CVE-2016-8650} {CVE-2016-8650}


Related CVEs


CVE-2016-8650
CVE-2016-9555

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) dtrace-modules-3.8.13-118.15.1.el6uek-0.4.5-3.el6.src.rpmed243c8b3b8832e7d99404ac357eebef14a06565832835d537197ac08f001f40-ol6_x86_64_UEKR3_latest
kernel-uek-3.8.13-118.15.1.el6uek.src.rpm6a32968fbaa82e0de10bfe7eac85ff264748f7b712c8303a68aaeb7932cfd704ELSA-2025-20007ol6_x86_64_UEKR3_latest
dtrace-modules-3.8.13-118.15.1.el6uek-0.4.5-3.el6.x86_64.rpm3fafa8588f2d1f04d83339bcbdcb1cede07845003c2c930e66178e750857944e-ol6_x86_64_UEKR3_latest
kernel-uek-3.8.13-118.15.1.el6uek.x86_64.rpm96036ef3b5623764e0fe21592642c13e995207337036c3cfdcf1d7c70d959dfeELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-debug-3.8.13-118.15.1.el6uek.x86_64.rpmeff6ec5e3335436616343f4624d8360f9e0d61b5d6af9b95e929eaed64af8d97ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-debug-devel-3.8.13-118.15.1.el6uek.x86_64.rpmab16e8eaa503acb9ba8118da78a338052cc30253443d3162257d033dea338455ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-devel-3.8.13-118.15.1.el6uek.x86_64.rpm839564c21b5f1e12f5feea72df99287d9c52cfab159b60fc73c8a15732d5d9beELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-doc-3.8.13-118.15.1.el6uek.noarch.rpme6e6ba7faff8b0d045afa68e29cb8269f7d7cc1ff1c491013c97f1abeed8e72aELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-firmware-3.8.13-118.15.1.el6uek.noarch.rpm5709a43e5a05d27e118bd13ec3a6810c567cd94a1b42d115b45aa63577ee196cELSA-2025-20007ol6_x86_64_UEKR3_latest
Oracle Linux 7 (x86_64) dtrace-modules-3.8.13-118.15.1.el7uek-0.4.5-3.el7.src.rpmd5d4e83f64280af11f3cd7ff8cb143e84a70eb3655272143cab77eb1ea5f3eab-ol7_x86_64_UEKR3
kernel-uek-3.8.13-118.15.1.el7uek.src.rpm4f7e0c3207e47109bf31ab53439d99b18c2b517f93a77098fea083856f8d2ad3ELSA-2025-20190ol7_x86_64_UEKR3
dtrace-modules-3.8.13-118.15.1.el7uek-0.4.5-3.el7.x86_64.rpm82f47bb0398d64ce843502e6de18fa119ff8331084683b6964c7acfe3b14e2b0-ol7_x86_64_UEKR3
kernel-uek-3.8.13-118.15.1.el7uek.x86_64.rpmeba7ef36679d98acca883807ca88dae95c34cdb7e87ae27c5595ae6b9fb0e685ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-debug-3.8.13-118.15.1.el7uek.x86_64.rpm1a686e26f5fcf7f9f09d15322d54a30f08a59ef81082ec7466dd229c5367bec9ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-debug-devel-3.8.13-118.15.1.el7uek.x86_64.rpmeee73ef7f160a40d08bb11e28b907cab39672a962cdacf69e5167712bb6ecbf0ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-devel-3.8.13-118.15.1.el7uek.x86_64.rpm74cad400df7f80a2820a51220ffdd96b59f4d68d277e6ef865a9c000d921f28bELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-doc-3.8.13-118.15.1.el7uek.noarch.rpm64ec90d438a6d209f8a2be57e23744a1e694cbe831de6df4f0896cafb8722d0aELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-firmware-3.8.13-118.15.1.el7uek.noarch.rpm9e935ca5359d7e1bc5922487a6f67b758cd8804d073d0b4e8f46d16dc209038dELSA-2025-20007ol7_x86_64_UEKR3



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete