OVMSA-2017-0004 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2017-01-12 |
Description
[4.1.12-61.1.25]
- KEYS: Fix short sprintf buffer in /proc/keys show function (David Howells) [Orabug: 25306361] {CVE-2016-7042}
- nvme: Limit command retries (Keith Busch) [Orabug: 25374751]
- fs/proc/task_mmu.c: fix mm_access() mode parameter in pagemap_read() (Kenny Keslar) [Orabug: 25374977]
- tcp: fix use after free in tcp_xmit_retransmit_queue() (Eric Dumazet) [Orabug: 25374364] {CVE-2016-6828}
- tunnels: Don't apply GRO to multiple layers of encapsulation. (Jesse Gross) [Orabug: 25036352] {CVE-2016-8666}
- i40e: Don't notify client(s) for DCB changes on all VSIs (Neerav Parikh) [Orabug: 25046290]
- packet: fix race condition in packet_set_ring (Philip Pettersson) [Orabug: 25231617] {CVE-2016-8655}
- netlink: Fix dump skb leak/double free (Herbert Xu) [Orabug: 25231692] {CVE-2016-9806}
- ALSA: pcm : Call kill_fasync() in stream lock (Takashi Iwai) [Orabug: 25231720] {CVE-2016-9794}
- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet) [Orabug: 25231751] {CVE-2016-9793}
[4.1.12-61.1.24]
- rebuild bumping release
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-61.1.25.el6uek.src.rpm | e7da96ab51762fe65dde51c953ebd4775b690e3390bbfd351451c2fa393f4bd9 | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-4.1.12-61.1.25.el6uek.x86_64.rpm | a14ef5766eccddbb88a3270a8a7137922046b7181d6f22792e5a06f985e11452 | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-firmware-4.1.12-61.1.25.el6uek.noarch.rpm | 06e615ca6bd13bc973b9dc40cb3cbe99035d0f193f67f5cae9796c8cdbcb4eb0 | OVMSA-2025-0001 | ovm34_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team