OVMSA-2017-0004

OVMSA-2017-0004 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2017-01-12

Description


[4.1.12-61.1.25]
- KEYS: Fix short sprintf buffer in /proc/keys show function (David Howells) [Orabug: 25306361] {CVE-2016-7042}
- nvme: Limit command retries (Keith Busch) [Orabug: 25374751]
- fs/proc/task_mmu.c: fix mm_access() mode parameter in pagemap_read() (Kenny Keslar) [Orabug: 25374977]
- tcp: fix use after free in tcp_xmit_retransmit_queue() (Eric Dumazet) [Orabug: 25374364] {CVE-2016-6828}
- tunnels: Don't apply GRO to multiple layers of encapsulation. (Jesse Gross) [Orabug: 25036352] {CVE-2016-8666}
- i40e: Don't notify client(s) for DCB changes on all VSIs (Neerav Parikh) [Orabug: 25046290]
- packet: fix race condition in packet_set_ring (Philip Pettersson) [Orabug: 25231617] {CVE-2016-8655}
- netlink: Fix dump skb leak/double free (Herbert Xu) [Orabug: 25231692] {CVE-2016-9806}
- ALSA: pcm : Call kill_fasync() in stream lock (Takashi Iwai) [Orabug: 25231720] {CVE-2016-9794}
- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet) [Orabug: 25231751] {CVE-2016-9793}

[4.1.12-61.1.24]
- rebuild bumping release


Related CVEs


CVE-2016-6828
CVE-2016-7042
CVE-2016-8666
CVE-2016-8655
CVE-2016-9806
CVE-2016-9794
CVE-2016-9793

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) kernel-uek-4.1.12-61.1.25.el6uek.src.rpm755f0fccce9c12d4f23235bdca48cd45OVMSA-2021-0016
kernel-uek-4.1.12-61.1.25.el6uek.x86_64.rpm4ea37df05189040a0a5fff6a8bd55dcfOVMSA-2021-0016
kernel-uek-firmware-4.1.12-61.1.25.el6uek.noarch.rpm1252124a37a5ef2c6248f7a782dc1794OVMSA-2021-0016



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete