ELSA-2018-4001

ELSA-2018-4001 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2018-01-03

Description


[4.1.12-112.14.2]
- fuse: Call end_queued_requests() after releasing fc->lock in fuse_dev_release() (Ashish Samant) [Orabug: 26431550]
- rds: Fix inaccurate accounting of unsignaled wrs in rds_ib_xmit_rdma (Hakon Bugge) [Orabug: 27097105]
- rds: Fix inaccurate accounting of unsignaled wrs (Hakon Bugge) [Orabug: 27097105]
- rds: ib: Fix NULL pointer dereference in debug code (Hakon Bugge) [Orabug: 27116566]
- bnx2x: fix slowpath null crash (Zhu Yanjun) [Orabug: 27133587]
- rds: System panic if RDS netfilter is enabled and RDS/TCP is used (Ka-Cheong Poon) [Orabug: 27150029]
- USB: serial: console: fix use-after-free after failed setup (Johan Hovold) [Orabug: 27206830] {CVE-2017-16525}
- mlx4: Subscribe to PXM notifier (Konrad Rzeszutek Wilk)
- xen/pci: Add PXM node notifier for PXM (NUMA) changes. (Konrad Rzeszutek Wilk)
- xen/pcifront: Walk the PCI bus after XenStore notification (Konrad Rzeszutek Wilk)
- uwb: properly check kthread_run return value (Andrey Konovalov) [Orabug: 27206880] {CVE-2017-16526}
- ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor (Takashi Iwai) [Orabug: 27206923] {CVE-2017-16529}
- USB: uas: fix bug in handling of alternate settings (Alan Stern) [Orabug: 27206999] {CVE-2017-16530}
- USB: fix out-of-bounds in usb_set_configuration (Greg Kroah-Hartman) [Orabug: 27207224] {CVE-2017-16531}
- HID: usbhid: fix out-of-bounds bug (Jaejoong Kim) [Orabug: 27207918] {CVE-2017-16533}
- USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor() (Alan Stern) [Orabug: 27207970] {CVE-2017-16535}
- [media] cx231xx-cards: fix NULL-deref on missing association descriptor (Johan Hovold) [Orabug: 27208047] {CVE-2017-16536}
- Replace max_t() with sub_positive() in dequeue_entity_load_avg() (Gayatri Vasudevan) [Orabug: 27222316]
- sched/fair: Fix cfs_rq avg tracking underflow (Gayatri Vasudevan) [Orabug: 27222316]
- KVM: nVMX: Fix vmx_check_nested_events() return value in case an event was reinjected to L2 (Liran Alon) [Orabug: 27250111]
- KVM: VMX: use kvm_event_needs_reinjection (Wanpeng Li) [Orabug: 27250111]
- KVM: nVMX: Fix pending events injection (Wanpeng Li) [Orabug: 27250111]


Related CVEs


CVE-2017-16525
CVE-2017-16529
CVE-2017-16535
CVE-2017-16526
CVE-2017-16530
CVE-2017-16531
CVE-2017-16533
CVE-2017-16536

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-112.14.2.el6uek.src.rpmb7e4f77c41e551cbdd5ceb42a5a060e2ELSA-2021-9215
kernel-uek-4.1.12-112.14.2.el6uek.x86_64.rpm4015e501f998fad5613c49476c030499ELSA-2021-9215
kernel-uek-debug-4.1.12-112.14.2.el6uek.x86_64.rpme01b8c339b0527fb20d2b8a10997ec35ELSA-2021-9215
kernel-uek-debug-devel-4.1.12-112.14.2.el6uek.x86_64.rpm8d1eed56417706ff8154d69d86717551ELSA-2021-9215
kernel-uek-devel-4.1.12-112.14.2.el6uek.x86_64.rpm3c2e0a55a15dfaf9102f00908ce9562cELSA-2021-9215
kernel-uek-doc-4.1.12-112.14.2.el6uek.noarch.rpmee8a5faaecf630dfea2f7895e71afef1ELSA-2021-9215
kernel-uek-firmware-4.1.12-112.14.2.el6uek.noarch.rpmbbd7a4abe55828b87cd93962356d5e95ELSA-2021-9215
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-112.14.2.el7uek.src.rpm684854bee75be9ee9bab337eec76efceELSA-2021-9220
kernel-uek-4.1.12-112.14.2.el7uek.x86_64.rpmc28010ab87eff9a4d9242691515eab2fELSA-2021-9220
kernel-uek-debug-4.1.12-112.14.2.el7uek.x86_64.rpm36524da15e51f2c8697e71dd5c77d07dELSA-2021-9220
kernel-uek-debug-devel-4.1.12-112.14.2.el7uek.x86_64.rpmdf8c65ee5af6a32d55c1e45526821fe1ELSA-2021-9220
kernel-uek-devel-4.1.12-112.14.2.el7uek.x86_64.rpm9e7fedd53ca1ba55902ddc8cf01a6363ELSA-2021-9220
kernel-uek-doc-4.1.12-112.14.2.el7uek.noarch.rpm10956a2db703ca9e8cc3936cd5c49926ELSA-2021-9220
kernel-uek-firmware-4.1.12-112.14.2.el7uek.noarch.rpm421bc84f08aaf158fb25a239f94d5d20ELSA-2021-9215



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete