Описание
ELSA-2016-3572: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.280.1]
- Fix cpu bootup stall with large cpu count (Zhenzhong Duan) [Orabug: 23481040]
- megaraid_sas : Update threshold based reply post host index register (Sumit.Saxena@avagotech.com) [Orabug: 23536267]
[2.6.39-400.279.1]
- IPoIB: increase send queue size to 4 times (Ajaykumar Hotchandani) [Orabug: 22287489]
- IB/ipoib: Change send workqueue size for CM mode (Ajaykumar Hotchandani) [Orabug: 22287489]
- Avoid 60sec timeout when receiving rtpg sense code 06/00/00 (John Sobecki) [Orabug: 22336257]
- stop recursive fault in print_context_stack after stack overflow (John Sobecki) [Orabug: 23174777]
- IB/security: Restrict use of the write() interface (Jason Gunthorpe) [Orabug: 23287131] {CVE-2016-4565}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.280.1.el5uek
kernel-uek-debug
2.6.39-400.280.1.el5uek
kernel-uek-debug-devel
2.6.39-400.280.1.el5uek
kernel-uek-devel
2.6.39-400.280.1.el5uek
kernel-uek-doc
2.6.39-400.280.1.el5uek
kernel-uek-firmware
2.6.39-400.280.1.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.280.1.el5uek
kernel-uek-debug
2.6.39-400.280.1.el5uek
kernel-uek-debug-devel
2.6.39-400.280.1.el5uek
kernel-uek-devel
2.6.39-400.280.1.el5uek
kernel-uek-doc
2.6.39-400.280.1.el5uek
kernel-uek-firmware
2.6.39-400.280.1.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.280.1.el6uek
kernel-uek-debug
2.6.39-400.280.1.el6uek
kernel-uek-debug-devel
2.6.39-400.280.1.el6uek
kernel-uek-devel
2.6.39-400.280.1.el6uek
kernel-uek-doc
2.6.39-400.280.1.el6uek
kernel-uek-firmware
2.6.39-400.280.1.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.280.1.el6uek
kernel-uek-debug
2.6.39-400.280.1.el6uek
kernel-uek-debug-devel
2.6.39-400.280.1.el6uek
kernel-uek-devel
2.6.39-400.280.1.el6uek
kernel-uek-doc
2.6.39-400.280.1.el6uek
kernel-uek-firmware
2.6.39-400.280.1.el6uek
Связанные CVE
Связанные уязвимости
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorre ...
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.