Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-07-10 |
[4.1.12-124.17.1]
- block: update integrity interval after queue limits change (Ritika Srivastava) [Orabug: 27586756]
- dccp: check sk for closed state in dccp_sendmsg() (Alexey Kodanev) [Orabug: 28001529] {CVE-2017-8824} {CVE-2018-1130}
- net/rds: Implement ARP flushing correctly (Hakon Bugge) [Orabug: 28219857]
- net/rds: Fix incorrect bigger vs. smaller IP address check (Hakon Bugge) [Orabug: 28236599]
- ocfs2: Fix locking for res->tracking and dlm->tracking_list (Ashish Samant) [Orabug: 28256391]
- xfrm: policy: check policy direction value (Vladis Dronov) [Orabug: 28256487] {CVE-2017-11600} {CVE-2017-11600}
[4.1.12-124.16.6]
- add kernel param to pre-allocate NICs (Brian Maly) [Orabug: 27870400]
- mm/mempolicy.c: fix error handling in set_mempolicy and mbind. (Chris Salls) [Orabug: 28242475] {CVE-2017-7616}
- xhci: Fix USB3 NULL pointer dereference at logical disconnect. (Mathias Nyman) [Orabug: 27426023]
- mlx4_core: restore optimal ICM memory allocation (Eric Dumazet) [Orabug: 27718303]
- mlx4_core: allocate ICM memory in page size chunks (Qing Huang) [Orabug: 27718303]
- kernel/signal.c: avoid undefined behaviour in kill_something_info When running kill(72057458746458112, 0) in userspace I hit the following issue. (mridula shastry) [Orabug: 28078687] {CVE-2018-10124}
- rds: tcp: compute m_ack_seq as offset from ->write_seq (Sowmini Varadhan) [Orabug: 28085214]
- ext4: fix bitmap position validation (Lukas Czerner) [Orabug: 28167032]
- net/rds: Fix bug in failover_group parsing (Hakon Bugge) [Orabug: 28198749]
- sctp: verify size of a new chunk in _sctp_make_chunk() (Alexey Kodanev) [Orabug: 28240074] {CVE-2018-5803}
[4.1.12-124.16.5]
- netfilter: xt_TCPMSS: add more sanity tests on tcph->doff (Eric Dumazet) [Orabug: 27896802] {CVE-2017-18017}
- kernel/exit.c: avoid undefined behaviour when calling wait4() wait4(-2147483648, 0x20, 0, 0xdd0000) triggers: UBSAN: Undefined behaviour in kernel/exit.c:1651:9 (mridula shastry) [Orabug: 28049778] {CVE-2018-10087}
- x86/bugs/module: Provide retpoline_modules_only parameter to fail non-retpoline modules (Konrad Rzeszutek Wilk) [Orabug: 28071992]
CVE-2017-7616 |
CVE-2017-18017 |
CVE-2018-5803 |
CVE-2018-1130 |
CVE-2017-11600 |
CVE-2018-10087 |
CVE-2018-10124 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-124.17.1.el6uek.src.rpm | 69fc5d9ce953ecf25f62b03e8491fb0d | ELSA-2021-9215 |
kernel-uek-4.1.12-124.17.1.el6uek.x86_64.rpm | 064d916c3b578ae57f1da20f2dd39e2c | ELSA-2021-9215 | |
kernel-uek-debug-4.1.12-124.17.1.el6uek.x86_64.rpm | b2dc917a0124d6987d24e374592b90dd | ELSA-2021-9215 | |
kernel-uek-debug-devel-4.1.12-124.17.1.el6uek.x86_64.rpm | 4d2c96cbb3a52f16ab60bf8e46b0d936 | ELSA-2021-9215 | |
kernel-uek-devel-4.1.12-124.17.1.el6uek.x86_64.rpm | 53308315870a342471873721393d0551 | ELSA-2021-9215 | |
kernel-uek-doc-4.1.12-124.17.1.el6uek.noarch.rpm | 59269e141abde0d656c65ec91fe007cd | ELSA-2021-9215 | |
kernel-uek-firmware-4.1.12-124.17.1.el6uek.noarch.rpm | c86926a95e8ddee022dff9b902216c70 | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | kernel-uek-4.1.12-124.17.1.el7uek.src.rpm | df44c1fec31de6e1d6495279b09f188f | ELSA-2021-9220 |
kernel-uek-4.1.12-124.17.1.el7uek.x86_64.rpm | 228d079d4a453aede35de8570e0f8cf9 | ELSA-2021-9220 | |
kernel-uek-debug-4.1.12-124.17.1.el7uek.x86_64.rpm | 55fac9cda82b12e3329ec2db8cdccce2 | ELSA-2021-9220 | |
kernel-uek-debug-devel-4.1.12-124.17.1.el7uek.x86_64.rpm | e7c823c75ae4c9b340c51fa229ac9c1b | ELSA-2021-9220 | |
kernel-uek-devel-4.1.12-124.17.1.el7uek.x86_64.rpm | 20e2360b9ec80ee72b0322dbc99f68ae | ELSA-2021-9220 | |
kernel-uek-doc-4.1.12-124.17.1.el7uek.noarch.rpm | d68b915192dede4308d0b58a66097666 | ELSA-2021-9220 | |
kernel-uek-firmware-4.1.12-124.17.1.el7uek.noarch.rpm | 156d83348ca600a7c0c9894e7de79940 | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team