[ELSA-2016-3657] Unbreakable Enterprise kernel security update
Severity
Important
Affected Packages
12
CVEs
2
[2.6.39-400.293.2]
- x86/iopl/64: properly context-switch IOPL on Xen PV (Andy Lutomirski) [Orabug: 25269184] {CVE-2016-3157}
- net: Fix use after free in the recvmmsg exit path (Arnaldo Carvalho de Melo) [Orabug: 25298618] {CVE-2016-7117}
- ID
- ELSA-2016-3657
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2016-3657.html
- Published
-
2016-12-21T00:00:00
(7 years ago) - Modified
-
2016-12-21T00:00:00
(7 years ago) - Rights
- Copyright 2016 Oracle, Inc.
- Other Advisories
-
- ALAS-2016-669
- ALAS-2016-694
- DSA-3607-1
- ELSA-2016-2962
- ELSA-2016-3529
- ELSA-2016-3655
- ELSA-2016-3656
- ELSA-2017-0036
- ELSA-2017-0086
- FEDORA-2016-7e602c0e5e
- FEDORA-2016-81fd1b03aa
- FEDORA-2016-ed5110c4bb
- RHSA-2017:0036
- RHSA-2017:0086
- RHSA-2017:0091
- SUSE-SU-2016:2976-1
- SUSE-SU-2016:3093-1
- SUSE-SU-2016:3094-1
- SUSE-SU-2016:3098-1
- SUSE-SU-2016:3100-1
- SUSE-SU-2016:3104-1
- SUSE-SU-2016:3109-1
- SUSE-SU-2016:3111-1
- SUSE-SU-2016:3112-1
- SUSE-SU-2016:3119-1
- SUSE-SU-2016:3249-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0494-1
- SUSE-SU-2017:0575-1
- SUSE-SU-2017:1102-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1990-1
- SUSE-SU-2017:2342-1
- USN-2965-1
- USN-2965-2
- USN-2965-3
- USN-2965-4
- USN-2968-1
- USN-2968-2
- USN-2969-1
- USN-2970-1
- USN-2971-1
- USN-2971-2
- USN-2971-3
- USN-2996-1
- USN-2997-1
- USN-3126-1
- USN-3126-2
- XSA-171
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2016-3657 | http://linux.oracle.com/errata/ELSA-2016-3657.html | |
CVE | CVE-2016-3157 | http://linux.oracle.com/cve/CVE-2016-3157.html | |
CVE | CVE-2016-7117 | http://linux.oracle.com/cve/CVE-2016-7117.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.39-400.293.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.39-400.293.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.293.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.293.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.39-400.293.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.39-400.293.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.39-400.293.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.39-400.293.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.39-400.293.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.39-400.293.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.293.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.293.2.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |