OVMSA-2017-0121

OVMSA-2017-0121 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-06-30

Description


[2.6.39-400.297.3]
- nfsd: check for oversized NFSv2/v3 arguments (J. Bruce Fields) [Orabug: 26366024] {CVE-2017-7645}

[2.6.39-400.297.2]
- dm mpath: allow ioctls to trigger pg init (Mikulas Patocka) [Orabug: 25645229]
- xen/manage: Always freeze/thaw processes when suspend/resuming (Ross Lagerwall) [Orabug: 25795530]
- lpfc cannot establish connection with targets that send PRLI under P2P mode (Joe Jin) [Orabug: 25955028]

[2.6.39-400.297.1]
- nvme: Handle PM1725 HIL reset (Martin K. Petersen) [Orabug: 26277602]
- dccp/tcp: do not inherit mc_list from parent (Eric Dumazet) [Orabug: 26108573] {CVE-2017-8890}

[2.6.39-400.296.1]
- cifs: adjust sequence number downward after signing NT_CANCEL request (Albert Barbe)
- nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) [Orabug: 25986995] {CVE-2017-7895}


Related CVEs


CVE-2017-7645

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.2 (x86_64) kernel-uek-2.6.39-400.297.3.el5uek.src.rpmb07c762ba1b7186c7eb8d68079dc4eee94aa52daf15bebfbadd5e80a830c7b8bOVMSA-2025-0001ovm3_3.2.1_x86_64_patch
kernel-uek-2.6.39-400.297.3.el5uek.x86_64.rpmb7b9e052fcc2ad2a20e29c902a29e201d7d8d4e3aad3f7828921b54362072135OVMSA-2025-0001ovm3_3.2.1_x86_64_patch
kernel-uek-firmware-2.6.39-400.297.3.el5uek.noarch.rpm34176e12b674ab2a5d5d4fb329303fae147c30666355f5bca5337076c4a87d03OVMSA-2025-0001ovm3_3.2.1_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete