OVMSA-2018-0286 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2018-12-07 |
Description
[4.1.12-124.23.1]
- xfs: don't call xfs_da_shrink_inode with NULL bp (Eric Sandeen) [Orabug: 28898616] {CVE-2018-13094}
- ALSA: rawmidi: Change resized buffers atomically (Takashi Iwai) [Orabug: 28898636] {CVE-2018-10902}
- md/raid5: fix a race condition in stripe batch (Shaohua Li) [Orabug: 28917012]
- xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE (Darrick J. Wong) [Orabug: 28924091] {CVE-2018-18690}
- certs: Add Oracle's new X509 cert into the kernel keyring (Eric Snowberg) [Orabug: 28926203]
- block: fix bdi vs gendisk lifetime mismatch (Shan Hai) [Orabug: 28945039]
- Add the following entries to 'uek-rpm/ol[67]/nano_modules.list': kernel/drivers/net/net_failover.ko kernel/net/core/failover.ko Fixes: b3bc7c163fc9 ('net: Introduce generic failover module') (Vijay Balakrishna) [Orabug: 28953351]
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (Andy Whitcroft) [Orabug: 28956547] {CVE-2018-7755} {CVE-2018-7755}
- iov_iter: don't revert iov buffer if csum error (Ding Tianhong) [Orabug: 28960296]
- crypto: salsa20 - fix blkcipher_walk API usage (Eric Biggers) [Orabug: 28976583] {CVE-2017-17805}
- crypto: hmac - require that the underlying hash algorithm is unkeyed (Eric Biggers) [Orabug: 28976653] {CVE-2017-17806}
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-124.23.1.el6uek.src.rpm | 3c1badd6979aba9e5e5bb7bc79389437831a81dabccbc77ffddbf2225ec07f90 | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-4.1.12-124.23.1.el6uek.x86_64.rpm | 76763cea393f2fe14c1e702359d1642402081fd51b5d6056115411671529ea62 | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-firmware-4.1.12-124.23.1.el6uek.noarch.rpm | ccb799a9b9119c90a12357b191a31dfc4798f493f2f1762c6a8ce99349c308e5 | OVMSA-2025-0001 | ovm34_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team