Описание
ELSA-2016-3551: Unbreakable Enterprise kernel security update (MODERATE)
kernel-uek [3.8.13-118.6.1]
- skbuff: skb_segment: orphan frags before copying (Dongli Zhang) [Orabug: 23018911]
- RDS/IB: VRPC DELAY / OSS RECONNECT CAUSES 5 MINUTE STALL ON PORT FAILURE (Venkat Venkatsubra) [Orabug: 22888920]
- mlx4_core: Introduce restrictions for PD update (Ajaykumar Hotchandani)
- filename should be destroyed via final_putname() instead of __putname() (John Sobecki) [Orabug: 22346320]
- RDS: Fix the atomicity for congestion map update (Wengang Wang) [Orabug: 23141554]
- sctp: Prevent soft lockup when sctp_accept() is called during a timeout event (Karl Heiss) [Orabug: 23222753] {CVE-2015-8767}
[3.8.13-118.5.1]
- x86_64: expand kernel stack to 16K (Minchan Kim) [Orabug: 21140371]
- iommu/vt-d: add quirk for broken interrupt remapping on 55XX chipsets (Neil Horman) [Orabug: 22534160]
- xen: remove unneeded variables and one constant (Daniel Kiper) [Orabug: 22288700]
- Revert 'x86/xen: delay construction of mfn_list_list' (Daniel Kiper) [Orabug: 22288700]
- ocfs2/dlm: fix misuse of list_move_tail() in dlm_run_purge_list() (Tariq Saeed) [Orabug: 22898384]
- ocfs2/dlm: do not purge lockres that is queued for assert master (Xue jiufei) [Orabug: 22898384]
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dtrace-modules-3.8.13-118.6.1.el6uek
0.4.5-3.el6
kernel-uek
3.8.13-118.6.1.el6uek
kernel-uek-debug
3.8.13-118.6.1.el6uek
kernel-uek-debug-devel
3.8.13-118.6.1.el6uek
kernel-uek-devel
3.8.13-118.6.1.el6uek
kernel-uek-doc
3.8.13-118.6.1.el6uek
kernel-uek-firmware
3.8.13-118.6.1.el6uek
Oracle Linux 7
Oracle Linux x86_64
dtrace-modules-3.8.13-118.6.1.el7uek
0.4.5-3.el7
kernel-uek
3.8.13-118.6.1.el7uek
kernel-uek-debug
3.8.13-118.6.1.el7uek
kernel-uek-debug-devel
3.8.13-118.6.1.el7uek
kernel-uek-devel
3.8.13-118.6.1.el7uek
kernel-uek-doc
3.8.13-118.6.1.el7uek
kernel-uek-firmware
3.8.13-118.6.1.el7uek
Связанные CVE
Связанные уязвимости
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not prope ...
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.