Oracle Linux 6277 Published by

A kernel security and bug fix update has been released for Oracle Linux 6.



El-errata: ELSA-2020-3548 Important: Oracle Linux 6 kernel security and bug fix update


Oracle Linux Security Advisory ELSA-2020-3548

  http://linux.oracle.com/errata/ELSA-2020-3548.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
kernel-2.6.32-754.33.1.el6.i686.rpm
kernel-abi-whitelists-2.6.32-754.33.1.el6.noarch.rpm
kernel-debug-2.6.32-754.33.1.el6.i686.rpm
kernel-debug-devel-2.6.32-754.33.1.el6.i686.rpm
kernel-devel-2.6.32-754.33.1.el6.i686.rpm
kernel-doc-2.6.32-754.33.1.el6.noarch.rpm
kernel-firmware-2.6.32-754.33.1.el6.noarch.rpm
kernel-headers-2.6.32-754.33.1.el6.i686.rpm
perf-2.6.32-754.33.1.el6.i686.rpm
python-perf-2.6.32-754.33.1.el6.i686.rpm

x86_64:
kernel-2.6.32-754.33.1.el6.x86_64.rpm
kernel-abi-whitelists-2.6.32-754.33.1.el6.noarch.rpm
kernel-debug-2.6.32-754.33.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-754.33.1.el6.i686.rpm
kernel-debug-devel-2.6.32-754.33.1.el6.x86_64.rpm
kernel-devel-2.6.32-754.33.1.el6.x86_64.rpm
kernel-doc-2.6.32-754.33.1.el6.noarch.rpm
kernel-firmware-2.6.32-754.33.1.el6.noarch.rpm
kernel-headers-2.6.32-754.33.1.el6.x86_64.rpm
perf-2.6.32-754.33.1.el6.x86_64.rpm
python-perf-2.6.32-754.33.1.el6.x86_64.rpm

SRPMS:
  http://oss.oracle.com/ol6/SRPMS-updates/kernel-2.6.32-754.33.1.el6.src.rpm


Description of changes:

[2.6.32-754.33.1.el6.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.33.1.el6]
- [message] scsi: mptscsih: Fix read sense data size (Tomas Henzl) [1824907]

[2.6.32-754.32.1.el6]
- [wireless] libertas: make lbs_ibss_join_existing() return error code
on rates overflow (Jarod Wilson) [1776569]
- [wireless] libertas: don't exit from lbs_ibss_join_existing() with RCU
read lock held (Jarod Wilson) [1776569]
- [wireless] libertas: Fix two buffer overflows at parsing bss
descriptor (Jarod Wilson) [1776569]
- [security] keys: Protect request_key() against a type with no match
function (Patrick Talbert) [1433220] {CVE-2017-2647}