OVMSA-2018-0256

OVMSA-2018-0256 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-09-14

Description


[4.1.12-124.19.2]
- tcp: add tcp_ooo_try_coalesce() helper (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: call tcp_drop() from tcp_data_queue_ofo() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: detect malicious patterns in tcp_collapse_ofo_queue() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: avoid collapses in tcp_prune_queue() if possible (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: free batches of packets in tcp_prune_ofo_queue() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: use an RB tree for ooo receive queue (Yaogong Wang) [Orabug: 28639707] {CVE-2018-5390}
- tcp: refine tcp_prune_ofo_queue() to not drop all packets (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: introduce tcp_under_memory_pressure() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}
- tcp: increment sk_drops for dropped rx packets (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390}


Related CVEs


CVE-2018-5390

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.4 (x86_64) kernel-uek-4.1.12-124.19.2.el6uek.src.rpm6763706fe5ffb7ccb5992a07c6c5895682a7ba7a335b6871ac84b678956105d1OVMSA-2025-0001ovm34_x86_64_latest
kernel-uek-4.1.12-124.19.2.el6uek.x86_64.rpm64f78b38dc24c412fab7628d26151f125ac3d5d1ac89a12ebc9cf98750be1be3OVMSA-2025-0001ovm34_x86_64_latest
kernel-uek-firmware-4.1.12-124.19.2.el6uek.noarch.rpme4393080839474aa5219f2ccd525cb1609cf393d7ed7905cf2aba77847905783OVMSA-2025-0001ovm34_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete