OVMSA-2019-0015 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2019-05-03 |
Description
[4.1.12-124.26.10]
- x86/apic: Make arch_setup_hwirq NUMA node aware (Henry Willard) [Orabug: 29534769]
[4.1.12-124.26.9]
- KEYS: encrypted: fix buffer overread in valid_master_desc() (Eric Biggers) [Orabug: 29591025] {CVE-2017-13305}
[4.1.12-124.26.8]
- scsi: target: remove hardcoded T10 Vendor ID in INQUIRY response (Alan Adamson) [Orabug: 29344862]
- scsi: target: add device vendor id, product id and revision configfs attributes (Alan Adamson) [Orabug: 29344862]
- scsi: target: consistently null-terminate t10_wwn strings (David Disseldorp) [Orabug: 29344862]
- scsi: target: use consistent left-aligned ASCII INQUIRY data (David Disseldorp) [Orabug: 29344862]
- ext4: fix data corruption caused by unaligned direct AIO (Lukas Czerner) [Orabug: 29553371]
- swiotlb: checking whether swiotlb buffer is full with io_tlb_used (Dongli Zhang) [Orabug: 29582587]
- swiotlb: add debugfs to track swiotlb buffer usage (Dongli Zhang) [Orabug: 29582587]
- swiotlb: fix comment on swiotlb_bounce() (Dongli Zhang) [Orabug: 29582587]
- NFSv4.1: nfs4_fl_prepare_ds must be careful about reporting success. (NeilBrown) [Orabug: 29617508]
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-124.26.10.el6uek.src.rpm | 23b5cad9ae5450034baab0f8e6c18caf | OVMSA-2021-0016 |
| kernel-uek-4.1.12-124.26.10.el6uek.x86_64.rpm | 1051f8ce1edfa405ab1376b392e9ab21 | OVMSA-2021-0016 |
| kernel-uek-firmware-4.1.12-124.26.10.el6uek.noarch.rpm | 3c6c13003061998764677b6b7ffe45c7 | OVMSA-2021-0016 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team