Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2017-04-13 |
kernel-uek
[4.1.12-61.1.34]
- uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug: 25698171]
- ksplice: add sysctls for determining Ksplice features. (Jamie Iles) [Orabug: 25698171]
- signal: protect SIGNAL_UNKILLABLE from unintentional clearing. (Jamie Iles) [Orabug: 25698171]
- KVM: x86: fix emulation of 'MOV SS, null selector' (Paolo Bonzini) [Orabug: 25719659] {CVE-2017-2583} {CVE-2017-2583}
- ext4: store checksum seed in superblock (Darrick J. Wong) [Orabug: 25719728] {CVE-2016-10208}
- ext4: reserve code points for the project quota feature (Theodore Ts'o) [Orabug: 25719728] {CVE-2016-10208}
- ext4: validate s_first_meta_bg at mount time (Eryu Guan) [Orabug: 25719728] {CVE-2016-10208}
- ext4: clean up feature test macros with predicate functions (Darrick J. Wong) [Orabug: 25719728] {CVE-2016-10208}
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo Ricardo Leitner) [Orabug: 25719793] {CVE-2017-5986}
- tcp: avoid infinite loop in tcp_splice_read() (Eric Dumazet) [Orabug: 25720805] {CVE-2017-6214}
- ip: fix IP_CHECKSUM handling (Paolo Abeni) [Orabug: 25720839] {CVE-2017-6347}
- udp: fix IP_CHECKSUM handling (Eric Dumazet) [Orabug: 25720839] {CVE-2017-6347}
- udp: do not expect udp headers in recv cmsg IP_CMSG_CHECKSUM (Willem de Bruijn) [Orabug: 25720839] {CVE-2017-6347}
- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder (Andy Whitcroft) [Orabug: 25814641] {CVE-2017-7184}
- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window (Andy Whitcroft) [Orabug: 25814641] {CVE-2017-7184}
- block: fix use-after-free in seq file (Vegard Nossum) [Orabug: 25877509] {CVE-2016-7910}
CVE-2016-7910 |
CVE-2017-2583 |
CVE-2017-6214 |
CVE-2017-6347 |
CVE-2017-7184 |
CVE-2016-10208 |
CVE-2017-5986 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | dtrace-modules-4.1.12-61.1.34.el6uek-0.5.3-2.el6.src.rpm | be91e032c60911d672e198c901d3c77c | - |
kernel-uek-4.1.12-61.1.34.el6uek.src.rpm | 62b4910631230de7a8c1b23c7bb0ad91 | ELSA-2021-9215 | |
dtrace-modules-4.1.12-61.1.34.el6uek-0.5.3-2.el6.x86_64.rpm | b8f876e269a5271701052efb7ae5d790 | - | |
kernel-uek-4.1.12-61.1.34.el6uek.x86_64.rpm | 8e99220bb85ed0340123d473398709c0 | ELSA-2021-9215 | |
kernel-uek-debug-4.1.12-61.1.34.el6uek.x86_64.rpm | 2f0431b999e11034f5ffa1c4aaee72cb | ELSA-2021-9215 | |
kernel-uek-debug-devel-4.1.12-61.1.34.el6uek.x86_64.rpm | ac15109fa2bc6d732a57847a17beab84 | ELSA-2021-9215 | |
kernel-uek-devel-4.1.12-61.1.34.el6uek.x86_64.rpm | 624c4900ebf01bc47ad70d0910de29e2 | ELSA-2021-9215 | |
kernel-uek-doc-4.1.12-61.1.34.el6uek.noarch.rpm | 401ee6b64d7f7e09d753e5a187e1a1b3 | ELSA-2021-9215 | |
kernel-uek-firmware-4.1.12-61.1.34.el6uek.noarch.rpm | 5f3d07a4a97f9f8266bc4c5d8ca5d478 | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | dtrace-modules-4.1.12-61.1.34.el7uek-0.5.3-2.el7.src.rpm | 8f074a67ac2acf577a80fce880f79c56 | - |
kernel-uek-4.1.12-61.1.34.el7uek.src.rpm | f06399e8540e8030843e881ab6a83103 | ELSA-2021-9220 | |
dtrace-modules-4.1.12-61.1.34.el7uek-0.5.3-2.el7.x86_64.rpm | 9e4f44f3c1ba66c5e114ad58ccfab7fb | - | |
kernel-uek-4.1.12-61.1.34.el7uek.x86_64.rpm | 412fb38f8c07eda690ff970dde7f7f41 | ELSA-2021-9220 | |
kernel-uek-debug-4.1.12-61.1.34.el7uek.x86_64.rpm | da68fd104b6590d98f6e44a72881aec5 | ELSA-2021-9220 | |
kernel-uek-debug-devel-4.1.12-61.1.34.el7uek.x86_64.rpm | 1ad91a3c94edc53eb7b4f7d7324999ae | ELSA-2021-9220 | |
kernel-uek-devel-4.1.12-61.1.34.el7uek.x86_64.rpm | 8da18ce1921c57321b3ef11438a36857 | ELSA-2021-9220 | |
kernel-uek-doc-4.1.12-61.1.34.el7uek.noarch.rpm | ed711eca6f87f92043b43a5967fdb8f0 | ELSA-2021-9220 | |
kernel-uek-firmware-4.1.12-61.1.34.el7uek.noarch.rpm | ab2d6570f91a5c5a1fb9a0a7c2256d1f | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team