OVMSA-2019-0015

OVMSA-2019-0015 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-05-03

Description


[4.1.12-124.26.10]
- x86/apic: Make arch_setup_hwirq NUMA node aware (Henry Willard) [Orabug: 29534769]

[4.1.12-124.26.9]
- KEYS: encrypted: fix buffer overread in valid_master_desc() (Eric Biggers) [Orabug: 29591025] {CVE-2017-13305}

[4.1.12-124.26.8]
- scsi: target: remove hardcoded T10 Vendor ID in INQUIRY response (Alan Adamson) [Orabug: 29344862]
- scsi: target: add device vendor id, product id and revision configfs attributes (Alan Adamson) [Orabug: 29344862]
- scsi: target: consistently null-terminate t10_wwn strings (David Disseldorp) [Orabug: 29344862]
- scsi: target: use consistent left-aligned ASCII INQUIRY data (David Disseldorp) [Orabug: 29344862]
- ext4: fix data corruption caused by unaligned direct AIO (Lukas Czerner) [Orabug: 29553371]
- swiotlb: checking whether swiotlb buffer is full with io_tlb_used (Dongli Zhang) [Orabug: 29582587]
- swiotlb: add debugfs to track swiotlb buffer usage (Dongli Zhang) [Orabug: 29582587]
- swiotlb: fix comment on swiotlb_bounce() (Dongli Zhang) [Orabug: 29582587]
- NFSv4.1: nfs4_fl_prepare_ds must be careful about reporting success. (NeilBrown) [Orabug: 29617508]


Related CVEs


CVE-2017-13305

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.4 (x86_64) kernel-uek-4.1.12-124.26.10.el6uek.src.rpm57c9a6ea7b6a8ce8469a6c5fbea2e3571d1ab2884ed377766f6782326a61bf36OVMSA-2025-0001ovm34_x86_64_latest
kernel-uek-4.1.12-124.26.10.el6uek.x86_64.rpm2934fde67f1ff4a2d0455d1d4097a33032c690972774d684832ea97d12d1a5fbOVMSA-2025-0001ovm34_x86_64_latest
kernel-uek-firmware-4.1.12-124.26.10.el6uek.noarch.rpmc1b20b9c57dd12d3b1a95f33675c0a9890da81bf3498a47d88f52711275e7f15OVMSA-2025-0001ovm34_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete