[ELSA-2016-3502] Unbreakable Enterprise kernel security update

Severity Important
Affected Packages 12
CVEs 6

[2.6.39-400.264.13]
- KEYS: Don't permit request_key() to construct a new keyring (David Howells) [Orabug: 22373449] {CVE-2015-7872}

[2.6.39-400.264.12]
- crypto: add missing crypto module aliases (Mathias Krause) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644}
- crypto: include crypto- module prefix in template (Kees Cook) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644}
- crypto: prefix module autoloading with 'crypto-' (Kees Cook) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644}

[2.6.39-400.264.11]
- KVM: x86: Don't report guest userspace emulation error to userspace (Nadav Amit) [Orabug: 22249615] {CVE-2010-5313} {CVE-2014-7842}

[2.6.39-400.264.9]
- msg_unlock() in wrong spot after applying 'Initialize msg/shm IPC objects before doing ipc_addid()' (Chuck Anderson) [Orabug: 22250044] {CVE-2015-7613} {CVE-2015-7613}

[2.6.39-400.264.8]
- ipc/sem.c: fully initialize sem_array before making it visible (Manfred Spraul) [Orabug: 22250044] {CVE-2015-7613}
- Initialize msg/shm IPC objects before doing ipc_addid() (Linus Torvalds) [Orabug: 22250044] {CVE-2015-7613}

[2.6.39-400.264.7]
- KVM: svm: unconditionally intercept #DB (Paolo Bonzini) [Orabug: 22333698] {CVE-2015-8104} {CVE-2015-8104}
- KVM: x86: work around infinite loop in microcode when #AC is delivered (Eric Northup) [Orabug: 22333689] {CVE-2015-5307} {CVE-2015-5307}

[2.6.39-400.264.6]
- mlx4_core: Introduce restrictions for PD update (Ajaykumar Hotchandani)

- IPoIB: Drop priv->lock before calling ipoib_send() (Wengang Wang)

- IPoIB: serialize changing on tx_outstanding (Wengang Wang) [Orabug: 21861366]
- IB/mlx4: Implement IB_QP_CREATE_USE_GFP_NOIO (Jiri Kosina)

- IB: Add a QP creation flag to use GFP_NOIO allocations (Or Gerlitz)

- IB: Return error for unsupported QP creation flags (Or Gerlitz)

- IB/ipoib: Calculate csum only when skb->ip_summed is CHECKSUM_PARTIAL (Yuval Shaia) [Orabug: 20873175]

ID
ELSA-2016-3502
Severity
important
URL
https://linux.oracle.com/errata/ELSA-2016-3502.html
Published
2016-01-08T00:00:00
(8 years ago)
Modified
2016-01-08T00:00:00
(8 years ago)
Rights
Copyright 2016 Oracle, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 oraclelinux kernel-uek < 2.6.39-400.264.13.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 oraclelinux kernel-uek < 2.6.39-400.264.13.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 oraclelinux kernel-uek-firmware < 2.6.39-400.264.13.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 oraclelinux kernel-uek-firmware < 2.6.39-400.264.13.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 oraclelinux kernel-uek-doc < 2.6.39-400.264.13.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 oraclelinux kernel-uek-doc < 2.6.39-400.264.13.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 oraclelinux kernel-uek-devel < 2.6.39-400.264.13.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 oraclelinux kernel-uek-devel < 2.6.39-400.264.13.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 oraclelinux kernel-uek-debug < 2.6.39-400.264.13.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 oraclelinux kernel-uek-debug < 2.6.39-400.264.13.el5uek oraclelinux-5
Affected pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 oraclelinux kernel-uek-debug-devel < 2.6.39-400.264.13.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 oraclelinux kernel-uek-debug-devel < 2.6.39-400.264.13.el5uek oraclelinux-5
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...