ELSA-2018-4299

ELSA-2018-4299 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-12-06

Description


[4.1.12-124.23.1]
- xfs: don't call xfs_da_shrink_inode with NULL bp (Eric Sandeen) [Orabug: 28898616] {CVE-2018-13094}
- ALSA: rawmidi: Change resized buffers atomically (Takashi Iwai) [Orabug: 28898636] {CVE-2018-10902}
- md/raid5: fix a race condition in stripe batch (Shaohua Li) [Orabug: 28917012]
- xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE (Darrick J. Wong) [Orabug: 28924091] {CVE-2018-18690}
- certs: Add Oracle's new X509 cert into the kernel keyring (Eric Snowberg) [Orabug: 28926203]
- block: fix bdi vs gendisk lifetime mismatch (Shan Hai) [Orabug: 28945039]
- Add the following entries to 'uek-rpm/ol[67]/nano_modules.list': kernel/drivers/net/net_failover.ko kernel/net/core/failover.ko Fixes: b3bc7c163fc9 ('net: Introduce generic failover module') (Vijay Balakrishna) [Orabug: 28953351]
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (Andy Whitcroft) [Orabug: 28956547] {CVE-2018-7755} {CVE-2018-7755}
- iov_iter: don't revert iov buffer if csum error (Ding Tianhong) [Orabug: 28960296]
- crypto: salsa20 - fix blkcipher_walk API usage (Eric Biggers) [Orabug: 28976583] {CVE-2017-17805}
- crypto: hmac - require that the underlying hash algorithm is unkeyed (Eric Biggers) [Orabug: 28976653] {CVE-2017-17806}


Related CVEs


CVE-2017-17805
CVE-2018-10902
CVE-2018-13094
CVE-2018-7755
CVE-2017-17806
CVE-2018-18690

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.23.1.el6uek.src.rpm3c1badd6979aba9e5e5bb7bc79389437831a81dabccbc77ffddbf2225ec07f90ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.23.1.el6uek.x86_64.rpm76763cea393f2fe14c1e702359d1642402081fd51b5d6056115411671529ea62ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.23.1.el6uek.x86_64.rpm6253b156d4921bd3a6c68be6829fe5d98f464079d520a014055a0ba4f09991d7ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.23.1.el6uek.x86_64.rpm9bc821621bf2bc4f261aa25bd70b413f1d3d61414daee71c10242010e9b993fcELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.23.1.el6uek.x86_64.rpm9ca8eb09d332f1493876e15006af7ed7781bfb0039d9c26a2acd4fd3adb6d6f3ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.23.1.el6uek.noarch.rpm7e84e45f98625cbf8db3eea304c9ef3afaa90dfb852a2c35f794668e43e1aef0ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.23.1.el6uek.noarch.rpmccb799a9b9119c90a12357b191a31dfc4798f493f2f1762c6a8ce99349c308e5ELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.23.1.el7uek.src.rpm5cc78b50770b326afc9cf02fe8bf861e0d0e388bd0a3b03fe05c474fb15847b3ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-124.23.1.el7uek.x86_64.rpmb88c80489e5f3558392246c24175e0251acb0095228b55c2b724795d38f116bfELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-124.23.1.el7uek.x86_64.rpm6cae252f5f455738ab4ab2aeda66eac593b329d98c7f7b3557b7f0230ab1b18dELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-124.23.1.el7uek.x86_64.rpm3adc42b77a6a67b8f10b03512f236ff7eda047f93b50fdf38c50046286961b44ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-124.23.1.el7uek.x86_64.rpm49d393d0217f4238b1f6767ba6135c5c891e5de52c9936b375d60614a8a9dc5eELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-124.23.1.el7uek.noarch.rpm6eb6d6e136edb1981137ae5a95e14633f21ef96b0dcd32961df8f8a5cb9cd86fELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-124.23.1.el7uek.noarch.rpmfa296456f552b58ea39ffbd56c5c7b665a57d7269810d55ab3cd560c22ae0e17ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete