OVMSA-2015-0122

OVMSA-2015-0122 - kernel-uek security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2015-09-16

Description


[3.8.13-98.2.2]
- sctp: fix ASCONF list handling (Marcelo Ricardo Leitner) [Orabug: 21842668] {CVE-2015-3212}
- KEYS: ensure we free the assoc array edit if edit is valid (Colin Ian King) [Orabug: 21842655] {CVE-2015-1333}

[3.8.13-98.2.1]
- Introduce [compat_]save_altstack_ex() to unbreak x86 SMAP (Al Viro) [Orabug: 21549587]
- x86, smap: Handle csum_partial_copy_*_user() (H. Peter Anvin) [Orabug: 21549587]
- ext4: fix warning in ext4_da_update_reserve_space() (Jan Kara) [Orabug: 21621442]
- ext4: remove unused variable in ext4_free_blocks() (Lukas Czerner) [Orabug: 21621442]
- quota: provide interface for readding allocated space into reserved space (Jan Kara) [Orabug: 21621442]


Related CVEs


CVE-2015-1333
CVE-2015-3212

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.3 (x86_64) kernel-uek-3.8.13-98.2.2.el6uek.src.rpmb6cb06bfb2f93687f4b7fd846a14c62fOVMSA-2021-0016
kernel-uek-3.8.13-98.2.2.el6uek.x86_64.rpmc585f6f3fb5efb15e79b2ee55a173d2fOVMSA-2021-0016
kernel-uek-firmware-3.8.13-98.2.2.el6uek.noarch.rpm4da3e1f92e134ae1ae2627f332192264OVMSA-2021-0016



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete