OVMSA-2018-0250 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2018-08-17 |
Description
[4.1.12-124.18.6]
- qla2xxx: Update the version to 9.00.00.00.41.0-k1. (Giridhar Malavali) [Orabug: 28172611]
- qla2xxx: Utilize complete local DMA buffer for DIF PI inforamtion. (Giridhar Malavali) [Orabug: 28172611]
- qla2xxx: Correction to total data segment count when local DMA buffers used for DIF PI. (Giridhar Malavali)
- scsi: megaraid_sas: fix the wrong way to get irq number (Jianchao Wang) [Orabug: 28436426]
- ALSA: seq: Make ioctls race-free (Takashi Iwai) [Orabug: 28459728] {CVE-2018-7566}
- ALSA: seq: Fix racy pool initializations (Takashi Iwai) [Orabug: 28459728] {CVE-2018-7566}
- oracleasm: Fix use after free for request processing timer (Martin K. Petersen) [Orabug: 28506080]
- oracleasm: Fix incorrectly set flag (Martin K. Petersen) [Orabug: 28506080]
- oracleasm: Fix memory leak (Martin K. Petersen) [Orabug: 28506080]
- oracleasm: Add ENXIO handling (Martin K. Petersen) [Orabug: 28506080]
- oracleasm: Add missing tracepoint (Martin K. Petersen) [Orabug: 28506080]
- oracleasm: Don't assume bip was allocated by oracleasm (Martin K. Petersen) [Orabug: 28506080]
- oracleasm: fix asmfs_dir_operations compiler error (Tom Saeger) [Orabug: 28506080]
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-124.18.6.el6uek.src.rpm | f2f2c8ef83ff1ad9327edec01ee456791b559a72039e68928b8eff38a7ffdd71 | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-4.1.12-124.18.6.el6uek.x86_64.rpm | 295eebbe976d3f7ba66f4084c202840537686f346a4269cf7cc2713fa3a74977 | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-firmware-4.1.12-124.18.6.el6uek.noarch.rpm | 3c1f6b72aed40dfbf78365af2f3eaa68481222f9083fc403bff0f22e6e79cf72 | OVMSA-2025-0001 | ovm34_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team