OVMSA-2020-0051 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2020-11-16 |
Description
[4.1.12-124.45.2]
- powercap: restrict energy meter to root access (Kanth Ghatraju) [Orabug: 32137965] {CVE-2020-8694} {CVE-2020-8695}
[4.1.12-124.45.1]
- Revert 'x86/efi: Initialize and display UEFI secure boot state a bit later during init' (Eric Snowberg) [Orabug: 31887248]
- xfs: fix xfs_inode use after free (Wengang Wang) [Orabug: 31932452]
- SUNRPC: ECONNREFUSED should cause a rebind. (NeilBrown) [Orabug: 32070175]
- netfilter: nfnetlink: correctly validate length of batch messages (Phil Turnbull) [Orabug: 30658635] {CVE-2016-7917}
- xc2028: Fix use-after-free bug properly (Takashi Iwai) [Orabug: 30658659] {CVE-2016-7913}
- [media] xc2028: avoid use after free (Mauro Carvalho Chehab) [Orabug: 30658659] {CVE-2016-7913}
- uek-rpm: Create initramfs at postinstall stage also. (Somasundaram Krishnasamy) [Orabug: 30821411]
- hdlc_ppp: add range checks in ppp_cp_parse_cr() (Dan Carpenter) [Orabug: 31989190] {CVE-2020-25643}
- tracing: Reverse the order of trace_types_lock and event_mutex (Alan Maguire) [Orabug: 32002706]
- ocfs2/dlm: move lock to the tail of grant queue while doing in-place convert (xuejiufei) [Orabug: 32071234]
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.4 (x86_64) | kernel-uek-4.1.12-124.45.2.el6uek.src.rpm | 9caf4914077326fc63867a8b46bc8b03cec91711adfae6f2ba9f888c079beed8 | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-4.1.12-124.45.2.el6uek.x86_64.rpm | b3c41b7be50e2208cb3e7e2a6a44364bf4dbb31260e2bc32f8fb6f7a75766bfa | OVMSA-2025-0001 | ovm34_x86_64_latest |
| kernel-uek-firmware-4.1.12-124.45.2.el6uek.noarch.rpm | b5ab410b44af11542bbd359961a20b2abb49ddc50ac2df341bc55df9f2fab53a | OVMSA-2025-0001 | ovm34_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team