Oracle Linux Security Advisory ELSA-2016-3567

https://linux.oracle.com/errata/ELSA-2016-3567.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-400.37.17.el6uek.i686.rpm
kernel-uek-debug-2.6.32-400.37.17.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.32-400.37.17.el6uek.i686.rpm
kernel-uek-devel-2.6.32-400.37.17.el6uek.i686.rpm
kernel-uek-doc-2.6.32-400.37.17.el6uek.noarch.rpm
kernel-uek-firmware-2.6.32-400.37.17.el6uek.noarch.rpm
ofa-2.6.32-400.37.17.el6uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-400.37.17.el6uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-400.37.17.el6uek-1.5.7-0.1.i686.rpm
mlnx_en-2.6.32-400.37.17.el6uekdebug-1.5.7-0.1.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-400.37.17.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-400.37.17.el6uek.noarch.rpm
kernel-uek-2.6.32-400.37.17.el6uek.x86_64.rpm
kernel-uek-devel-2.6.32-400.37.17.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-400.37.17.el6uek.x86_64.rpm
kernel-uek-debug-2.6.32-400.37.17.el6uek.x86_64.rpm
ofa-2.6.32-400.37.17.el6uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-400.37.17.el6uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-400.37.17.el6uek-1.5.7-0.1.x86_64.rpm
mlnx_en-2.6.32-400.37.17.el6uekdebug-1.5.7-0.1.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.32-400.37.17.el6uek.src.rpm
https://oss.oracle.com:443/ol6/SRPMS-updates/ofa-2.6.32-400.37.17.el6uek-1.5.1-4.0.58.src.rpm
https://oss.oracle.com:443/ol6/SRPMS-updates/mlnx_en-2.6.32-400.37.17.el6uek-1.5.7-0.1.src.rpm



Description of changes:

kernel-uek
[2.6.32-400.37.17.el6uek]
- net: add validation for the socket syscall protocol argument (Hannes 
Frederic Sowa)  [Orabug: 23267965]  {CVE-2015-8543} {CVE-2015-8543}
- ext4: Fix null dereference in ext4_fill_super() (Ben Hutchings) 
[Orabug: 23263398]  {CVE-2015-8324} {CVE-2015-8324}
- ipv6: addrconf: validate new MTU before applying it (Marcelo Leitner) 
  [Orabug: 23263242]  {CVE-2015-8215}
- ext4: avoid hang when mounting non-journal filesystems with orphan 
list (Theodore Ts'o)  [Orabug: 23262201]  {CVE-2015-7509}
- ext4: make orphan functions be no-op in no-journal mode (Anatol 
Pomozov)  [Orabug: 23262201]  {CVE-2015-7509}
- unix: properly account for FDs passed over unix sockets (willy 
tarreau)  [Orabug: 23262258]  {CVE-2013-4312} {CVE-2013-4312}

Oracle6: ELSA-2016-3567: kernel Important Security Update

The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network:

Summary

kernel-uek [2.6.32-400.37.17.el6uek] - net: add validation for the socket syscall protocol argument (Hannes Frederic Sowa) [Orabug: 23267965] {CVE-2015-8543} {CVE-2015-8543} - ext4: Fix null dereference in ext4_fill_super() (Ben Hutchings) [Orabug: 23263398] {CVE-2015-8324} {CVE-2015-8324} - ipv6: addrconf: validate new MTU before applying it (Marcelo Leitner) [Orabug: 23263242] {CVE-2015-8215} - ext4: avoid hang when mounting non-journal filesystems with orphan list (Theodore Ts'o) [Orabug: 23262201] {CVE-2015-7509} - ext4: make orphan functions be no-op in no-journal mode (Anatol Pomozov) [Orabug: 23262201] {CVE-2015-7509} - unix: properly account for FDs passed over unix sockets (willy tarreau) [Orabug: 23262258] {CVE-2013-4312} {CVE-2013-4312}

SRPMs

https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.32-400.37.17.el6uek.src.rpm https://oss.oracle.com:443/ol6/SRPMS-updates/ofa-2.6.32-400.37.17.el6uek-1.5.1-4.0.58.src.rpm https://oss.oracle.com:443/ol6/SRPMS-updates/mlnx_en-2.6.32-400.37.17.el6uek-1.5.7-0.1.src.rpm

x86_64

kernel-uek-firmware-2.6.32-400.37.17.el6uek.noarch.rpm kernel-uek-doc-2.6.32-400.37.17.el6uek.noarch.rpm kernel-uek-2.6.32-400.37.17.el6uek.x86_64.rpm kernel-uek-devel-2.6.32-400.37.17.el6uek.x86_64.rpm kernel-uek-debug-devel-2.6.32-400.37.17.el6uek.x86_64.rpm kernel-uek-debug-2.6.32-400.37.17.el6uek.x86_64.rpm ofa-2.6.32-400.37.17.el6uek-1.5.1-4.0.58.x86_64.rpm ofa-2.6.32-400.37.17.el6uekdebug-1.5.1-4.0.58.x86_64.rpm mlnx_en-2.6.32-400.37.17.el6uek-1.5.7-0.1.x86_64.rpm mlnx_en-2.6.32-400.37.17.el6uekdebug-1.5.7-0.1.x86_64.rpm

aarch64

i386

kernel-uek-2.6.32-400.37.17.el6uek.i686.rpm kernel-uek-debug-2.6.32-400.37.17.el6uek.i686.rpm kernel-uek-debug-devel-2.6.32-400.37.17.el6uek.i686.rpm kernel-uek-devel-2.6.32-400.37.17.el6uek.i686.rpm kernel-uek-doc-2.6.32-400.37.17.el6uek.noarch.rpm kernel-uek-firmware-2.6.32-400.37.17.el6uek.noarch.rpm ofa-2.6.32-400.37.17.el6uek-1.5.1-4.0.58.i686.rpm ofa-2.6.32-400.37.17.el6uekdebug-1.5.1-4.0.58.i686.rpm mlnx_en-2.6.32-400.37.17.el6uek-1.5.7-0.1.i686.rpm mlnx_en-2.6.32-400.37.17.el6uekdebug-1.5.7-0.1.i686.rpm

Severity

Related News