Oracle alert ELSA-2016-3502 (kernel 2.6.39)
From: | Errata Announcements for Oracle Linux <el-errata@oss.oracle.com> | |
To: | el-errata@oss.oracle.com | |
Subject: | [El-errata] ELSA-2016-3502 Important: Oracle Linux 5 Unbreakable Enterprise kernel security update | |
Date: | Sat, 9 Jan 2016 08:37:20 -0800 | |
Message-ID: | <56913740.8030704@oracle.com> |
Oracle Linux Security Advisory ELSA-2016-3502 http://linux.oracle.com/errata/ELSA-2016-3502.html The following updated rpms for Oracle Linux 5 have been uploaded to the Unbreakable Linux Network: i386: kernel-uek-2.6.39-400.264.13.el5uek.i686.rpm kernel-uek-debug-2.6.39-400.264.13.el5uek.i686.rpm kernel-uek-debug-devel-2.6.39-400.264.13.el5uek.i686.rpm kernel-uek-devel-2.6.39-400.264.13.el5uek.i686.rpm kernel-uek-doc-2.6.39-400.264.13.el5uek.noarch.rpm kernel-uek-firmware-2.6.39-400.264.13.el5uek.noarch.rpm x86_64: kernel-uek-firmware-2.6.39-400.264.13.el5uek.noarch.rpm kernel-uek-doc-2.6.39-400.264.13.el5uek.noarch.rpm kernel-uek-2.6.39-400.264.13.el5uek.x86_64.rpm kernel-uek-devel-2.6.39-400.264.13.el5uek.x86_64.rpm kernel-uek-debug-devel-2.6.39-400.264.13.el5uek.x86_64.rpm kernel-uek-debug-2.6.39-400.264.13.el5uek.x86_64.rpm SRPMS: http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.39... Description of changes: [2.6.39-400.264.13.el5uek] - KEYS: Don't permit request_key() to construct a new keyring (David Howells) [Orabug: 22373449] {CVE-2015-7872} [2.6.39-400.264.12.el5uek] - crypto: add missing crypto module aliases (Mathias Krause) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644} - crypto: include crypto- module prefix in template (Kees Cook) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644} - crypto: prefix module autoloading with "crypto-" (Kees Cook) [Orabug: 22249656] {CVE-2013-7421} {CVE-2014-9644} [2.6.39-400.264.11.el5uek] - KVM: x86: Don't report guest userspace emulation error to userspace (Nadav Amit) [Orabug: 22249615] {CVE-2010-5313} {CVE-2014-7842} [2.6.39-400.264.9.el5uek] - msg_unlock() in wrong spot after applying "Initialize msg/shm IPC objects before doing ipc_addid()" (Chuck Anderson) [Orabug: 22250044] {CVE-2015-7613} {CVE-2015-7613} [2.6.39-400.264.8.el5uek] - ipc/sem.c: fully initialize sem_array before making it visible (Manfred Spraul) [Orabug: 22250044] {CVE-2015-7613} - Initialize msg/shm IPC objects before doing ipc_addid() (Linus Torvalds) [Orabug: 22250044] {CVE-2015-7613} [2.6.39-400.264.7.el5uek] - KVM: svm: unconditionally intercept #DB (Paolo Bonzini) [Orabug: 22333698] {CVE-2015-8104} {CVE-2015-8104} - KVM: x86: work around infinite loop in microcode when #AC is delivered (Eric Northup) [Orabug: 22333689] {CVE-2015-5307} {CVE-2015-5307} [2.6.39-400.264.6.el5uek] - mlx4_core: Introduce restrictions for PD update (Ajaykumar Hotchandani) - IPoIB: Drop priv->lock before calling ipoib_send() (Wengang Wang) - IPoIB: serialize changing on tx_outstanding (Wengang Wang) [Orabug: 21861366] - IB/mlx4: Implement IB_QP_CREATE_USE_GFP_NOIO (Jiri Kosina) - IB: Add a QP creation flag to use GFP_NOIO allocations (Or Gerlitz) - IB: Return error for unsupported QP creation flags (Or Gerlitz) - IB/ipoib: Calculate csum only when skb->ip_summed is CHECKSUM_PARTIAL (Yuval Shaia) [Orabug: 20873175] _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata