OVMSA-2016-0084

OVMSA-2016-0084 - kernel-uek security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-06-22

Description


[3.8.13-118.8.1]
- Revert 'x86_64: expand kernel stack to 16K' (Chuck Anderson) [Orabug: 23608686]

[3.8.13-118.7.1]
- megaraid_sas : Update threshold based reply post host index register (Sumit.Saxena@avagotech.com) [Orabug: 23562756]
- xen/events: Don't move disabled irqs (Ross Lagerwall) [Orabug: 23055234]
- xen/events: Mask a moving irq (Boris Ostrovsky) [Orabug: 23055234]
- xen/pciback: Save the number of MSI-X entries to be copied later. (Dongli Zhang) [Orabug: 23202410]
- xen/pciback: Save xen_pci_op commands before processing it (Dongli Zhang) [Orabug: 23202410]
- xen-blkback: read from indirect descriptors only once (Dongli Zhang) [Orabug: 23202410]
- xen-blkback: only read request operation from shared ring once (Dongli Zhang) [Orabug: 23202410]
- xen-netback: use RING_COPY_REQUEST() throughout (Dongli Zhang) [Orabug: 23202410]
- xen-netback: don't use last request to determine minimum Tx credit (Dongli Zhang) [Orabug: 23202410]
- xen: Add RING_COPY_REQUEST() (Dongli Zhang) [Orabug: 23202410]
- IB/security: Restrict use of the write() interface (Jason Gunthorpe) [Orabug: 23283925] {CVE-2016-4565}


Related CVEs


CVE-2016-4565

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.3 (x86_64) kernel-uek-3.8.13-118.8.1.el6uek.src.rpm3910f8cf38a87fadc5d62eb06306ec6ea83e8aaf03fdf0543799e587567e56faOVMSA-2025-0001ovm3_x86_64_3.3_patch
kernel-uek-3.8.13-118.8.1.el6uek.x86_64.rpmadfab953172f1adc02a20e93d3e8b9afe96ffb65af7e52e58947172d05384d2bOVMSA-2025-0001ovm3_x86_64_3.3_patch
kernel-uek-firmware-3.8.13-118.8.1.el6uek.noarch.rpm6d22507de9a9952f8e008cf5436d2914242b50959ba241475f5956db591dce05OVMSA-2025-0001ovm3_x86_64_3.3_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete