Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2017-05-16 |
kernel-uek
[3.8.13-118.18.2]
- nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) [Orabug: 25986990] {CVE-2017-7895}
[3.8.13-118.18.1]
- fnic: Update fnic driver version to 1.6.0.24 (John Sobecki) [Orabug: 24448585]
- xen-netfront: Rework the fix for Rx stall during OOM and network stress (Dongli Zhang) [Orabug: 25450703]
- xen-netfront: Fix Rx stall during network stress and OOM (Dongli Zhang) [Orabug: 25450703]
- ipv6: Skip XFRM lookup if dst_entry in socket cache is valid (Jakub Sitnicki)
- uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug: 25549809]
- ksplice: add sysctls for determining Ksplice features. (Jamie Iles) [Orabug: 25549809]
- signal: protect SIGNAL_UNKILLABLE from unintentional clearing. (Jamie Iles) [Orabug: 25549809]
- VSOCK: Fix lockdep issue. (Dongli Zhang) [Orabug: 25559937]
- VSOCK: sock_put wasn't safe to call in interrupt context (Dongli Zhang) [Orabug: 25559937]
- IB/CORE: sync the resouce access in fmr_pool (Wengang Wang) [Orabug: 25677469]
- KVM: x86: fix emulation of 'MOV SS, null selector' (Paolo Bonzini) [Orabug: 25719675] {CVE-2017-2583} {CVE-2017-2583}
- ext4: validate s_first_meta_bg at mount time (Eryu Guan) [Orabug: 25719738] {CVE-2016-10208}
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo Ricardo Leitner) [Orabug: 25719810] {CVE-2017-5986}
- tcp: avoid infinite loop in tcp_splice_read() (Eric Dumazet) [Orabug: 25720813] {CVE-2017-6214}
- lpfc cannot establish connection with targets that send PRLI under P2P mode (Joe Jin) [Orabug: 25759083]
- USB: visor: fix null-deref at probe (Johan Hovold) [Orabug: 25796594] {CVE-2016-2782}
- ipc/shm: Fix shmat mmap nil-page protection (Davidlohr Bueso) [Orabug: 25797012] {CVE-2017-5669}
- vhost: actually track log eventfd file (Marc-Andre Lureau) [Orabug: 25797052] {CVE-2015-6252}
- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder (Andy Whitcroft) [Orabug: 25814663] {CVE-2017-7184}
- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window (Andy Whitcroft) [Orabug: 25814663] {CVE-2017-7184}
- KEYS: Remove key_type::match in favour of overriding default by match_preparse (Aniket Alshi) [Orabug: 25823962] {CVE-2017-2647} {CVE-2017-2647}
- USB: whiteheat: fix potential null-deref at probe (Johan Hovold) [Orabug: 25825105] {CVE-2015-5257} {CVE-2015-5257}
- udf: Check path length when reading symlink (Jan Kara) [Orabug: 25871102] {CVE-2015-9731}
- udp: properly support MSG_PEEK with truncated buffers (Eric Dumazet) [Orabug: 25876655] {CVE-2016-10229}
- block: fix use-after-free in seq file (Vegard Nossum) [Orabug: 25877530] {CVE-2016-7910}
- Revert 'fix minor infoleak in get_user_ex()' (Brian Maly) [Orabug: 25790392] {CVE-2016-9644}
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766911] {CVE-2016-8399}
- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765776] {CVE-2016-10142}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765445] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25751996] {CVE-2017-7187}
CVE-2017-2583 |
CVE-2017-6214 |
CVE-2017-7184 |
CVE-2016-10208 |
CVE-2017-5986 |
CVE-2017-7895 |
CVE-2015-6252 |
CVE-2017-2647 |
CVE-2015-5257 |
CVE-2015-9731 |
CVE-2016-2782 |
CVE-2017-5669 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | dtrace-modules-3.8.13-118.18.2.el6uek-0.4.5-3.el6.src.rpm | 7cc8cc7585d24bc9c8ecc1307ceb9ed7 | - |
kernel-uek-3.8.13-118.18.2.el6uek.src.rpm | d54dcd65d1ef6a3d9b699ccea96dc3e9 | ELSA-2021-9215 | |
dtrace-modules-3.8.13-118.18.2.el6uek-0.4.5-3.el6.x86_64.rpm | e85e8d6e43a821fb16f4c2e8a2405a64 | - | |
kernel-uek-3.8.13-118.18.2.el6uek.x86_64.rpm | 156362dca7d3c5c145bd24252708360c | ELSA-2021-9215 | |
kernel-uek-debug-3.8.13-118.18.2.el6uek.x86_64.rpm | cf9299353193430395af1258f52fa579 | ELSA-2021-9215 | |
kernel-uek-debug-devel-3.8.13-118.18.2.el6uek.x86_64.rpm | 46ae6030a8eccbcac96a7d7d342f48d3 | ELSA-2021-9215 | |
kernel-uek-devel-3.8.13-118.18.2.el6uek.x86_64.rpm | 896756de8ef0eedd1dbb7b1c7c8f3e01 | ELSA-2021-9215 | |
kernel-uek-doc-3.8.13-118.18.2.el6uek.noarch.rpm | 673e860c497681ffd16180baa96f904a | ELSA-2021-9215 | |
kernel-uek-firmware-3.8.13-118.18.2.el6uek.noarch.rpm | f4a4d1ebc84dea161027678c838994cd | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | dtrace-modules-3.8.13-118.18.2.el7uek-0.4.5-3.el7.src.rpm | 7494bbdb35ef52369584f927ca53f1c5 | - |
kernel-uek-3.8.13-118.18.2.el7uek.src.rpm | 3ccbd69f8e23b718dc4a1dd5af7b9576 | ELSA-2021-9220 | |
dtrace-modules-3.8.13-118.18.2.el7uek-0.4.5-3.el7.x86_64.rpm | a5d5ff7e4cdb9f71aa9d81d7f754ad14 | - | |
kernel-uek-3.8.13-118.18.2.el7uek.x86_64.rpm | 2c158849b6d0bd438a4b7700c7b605c9 | ELSA-2021-9220 | |
kernel-uek-debug-3.8.13-118.18.2.el7uek.x86_64.rpm | 3371627c8925a5e9a0e2f43049a67055 | ELSA-2021-9220 | |
kernel-uek-debug-devel-3.8.13-118.18.2.el7uek.x86_64.rpm | 213e0c1ba1395f5e91e40ca987494979 | ELSA-2021-9220 | |
kernel-uek-devel-3.8.13-118.18.2.el7uek.x86_64.rpm | 4372404dd5374b0d74b748fb81699c84 | ELSA-2021-9220 | |
kernel-uek-doc-3.8.13-118.18.2.el7uek.noarch.rpm | a50f8401ef91b68c395a920b3e991a2c | ELSA-2021-9220 | |
kernel-uek-firmware-3.8.13-118.18.2.el7uek.noarch.rpm | 4624007b43f9f0fd7a6ff4745aeb20f8 | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team