[ELSA-2016-3636] Unbreakable Enterprise kernel security update
Severity
Important
Affected Packages
14
CVEs
1
kernel-uek
[3.8.13-118.14.1]
- ecryptfs: forbid opening files without mmap handler (Jann Horn) [Orabug: 24971919] {CVE-2016-1583}
- RDS: IB: fix panic with handlers running post teardown (Santosh Shilimkar) [Orabug: 24395795]
- ID
- ELSA-2016-3636
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2016-3636.html
- Published
-
2016-11-03T00:00:00
(7 years ago) - Modified
-
2016-11-03T00:00:00
(7 years ago) - Rights
- Copyright 2016 Oracle, Inc.
- Other Advisories
-
- DSA-3607-1
- ELSA-2016-2124
- ELSA-2016-2766
- ELSA-2016-3635
- ELSA-2016-3644
- ELSA-2016-3646
- ELSA-2019-4644
- FEDORA-2016-1c409313f4
- FEDORA-2016-63ee0999e4
- FEDORA-2016-73a733f4d9
- RHSA-2016:2766
- SUSE-SU-2016:1596-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2017:0333-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-2999-1
- USN-3000-1
- USN-3001-1
- USN-3002-1
- USN-3003-1
- USN-3004-1
- USN-3005-1
- USN-3006-1
- USN-3007-1
- USN-3008-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2016-3636 | http://linux.oracle.com/errata/ELSA-2016-3636.html | |
CVE | CVE-2016-1583 | http://linux.oracle.com/cve/CVE-2016-1583.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 3.8.13-118.14.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 3.8.13-118.14.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 3.8.13-118.14.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 3.8.13-118.14.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 3.8.13-118.14.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 3.8.13-118.14.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 3.8.13-118.14.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 3.8.13-118.14.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 3.8.13-118.14.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 3.8.13-118.14.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 3.8.13-118.14.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 3.8.13-118.14.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-3.8.13-118.14.1.el7uek?distro=oraclelinux-7 | oraclelinux | dtrace-modules-3.8.13-118.14.1.el7uek | < 0.4.5-3.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-3.8.13-118.14.1.el6uek?distro=oraclelinux-6 | oraclelinux | dtrace-modules-3.8.13-118.14.1.el6uek | < 0.4.5-3.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |