Описание
ELSA-2016-3652: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.293.1]
- logging errors that get masked to EIO inside drivers/block/loop.c (Manjunath Patil) [Orabug: 21962821]
- sched/core: Clear the root_domain cpumasks in init_rootdomain() (Xunlei Pang) [Orabug: 23518650]
- bio allocation failure due to bio_get_nr_vecs() (Darrick J. Wong) [Orabug: 23852442]
- mlx4: avoid ABBA deadlock (Wengang Wang) [Orabug: 23538548]
- mlx4: avoid multiple free on id_map_ent (Wengang Wang) [Orabug: 25022815]
- sctp: validate chunk len before actually using it (Marcelo Ricardo Leitner) [Orabug: 25142906] {CVE-2016-9555}
[2.6.39-400.292.1]
- NVMe: reduce queue depth as workaround for Samsung EPIC SQ errata (Ashok Vairavan) [Orabug: 25138146]
[2.6.39-400.291.1]
- RDS: Drop the connection as part of cancel to avoid hangs (Avinash Repaka) [Orabug: 24951873]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.293.1.el5uek
kernel-uek-debug
2.6.39-400.293.1.el5uek
kernel-uek-debug-devel
2.6.39-400.293.1.el5uek
kernel-uek-devel
2.6.39-400.293.1.el5uek
kernel-uek-doc
2.6.39-400.293.1.el5uek
kernel-uek-firmware
2.6.39-400.293.1.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.293.1.el5uek
kernel-uek-debug
2.6.39-400.293.1.el5uek
kernel-uek-debug-devel
2.6.39-400.293.1.el5uek
kernel-uek-devel
2.6.39-400.293.1.el5uek
kernel-uek-doc
2.6.39-400.293.1.el5uek
kernel-uek-firmware
2.6.39-400.293.1.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.293.1.el6uek
kernel-uek-debug
2.6.39-400.293.1.el6uek
kernel-uek-debug-devel
2.6.39-400.293.1.el6uek
kernel-uek-devel
2.6.39-400.293.1.el6uek
kernel-uek-doc
2.6.39-400.293.1.el6uek
kernel-uek-firmware
2.6.39-400.293.1.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.293.1.el6uek
kernel-uek-debug
2.6.39-400.293.1.el6uek
kernel-uek-debug-devel
2.6.39-400.293.1.el6uek
kernel-uek-devel
2.6.39-400.293.1.el6uek
kernel-uek-doc
2.6.39-400.293.1.el6uek
kernel-uek-firmware
2.6.39-400.293.1.el6uek
Связанные CVE
Связанные уязвимости
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kern ...
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.