[ELSA-2017-3200] kernel security and bug fix update
[2.6.32-696.16.1.OL6]
- Update genkey [bug 25599697]
[2.6.32-696.16.1]
- [net] packet: fix tp_reserve race in packet_set_ring (Stefano Brivio) [1481941 1481943] {CVE-2017-1000111}
- [net] packet: fix overflow in check for tp_frame_nr (Stefano Brivio) [1481941 1481943] {CVE-2017-1000111}
- [net] packet: fix overflow in check for tp_reserve (Stefano Brivio) [1481941 1481943] {CVE-2017-1000111}
- [netdrv] sfc: tx ring can only have 2048 entries for all EF10 NICs (Jarod Wilson) [1498019 1441773]
- [fs] sunrpc: always treat the invalid cache as unexpired (Thiago Becker) [1497976 1477288]
- [fs] sunrpc: xpt_auth_cache should be ignored when expired (Thiago Becker) [1497976 1477288]
- [net] tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0 (Davide Caratti) [1488344 1488340] {CVE-2017-14106}
- [net] tcp: fix 0 divide in __tcp_select_window() (Davide Caratti) [1488344 1488340] {CVE-2017-14106}
- [scsi] lpfc: fix 'integer constant too large' error on 32bit archs (Maurizio Lombardi) [1487220 1441169]
- [scsi] lpfc: version 11.0.1.6 is 11.0.0.6 with no_hba_reset patches (Maurizio Lombardi) [1487220 1441169]
- [scsi] lpfc: Vport creation is failing with 'Link Down' error (Maurizio Lombardi) [1487220 1441169]
- [scsi] lpfc: Fix panic on BFS configuration (Maurizio Lombardi) [1487220 1441169]
- [scsi] lpfc: Fix eh_deadline setting for sli3 adapters (Maurizio Lombardi) [1487220 1441169]
- [scsi] lpfc: Correct panics with eh_timeout and eh_deadline (Maurizio Lombardi) [1487220 1441169]
- [net] udp: consistently apply ufo or fragmentation (Davide Caratti) [1481532 1481529] {CVE-2017-1000112}
- [net] ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (Davide Caratti) [1481532 1481529] {CVE-2017-1000112}
- [net] ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (Davide Caratti) [1481532 1481529] {CVE-2017-1000112}
[2.6.32-696.15.1]
- [fs] binfmt_elf.c:load_elf_binary(): return -EINVAL on zero-length mappings (Petr Matousek) [1492959 1492961] {CVE-2017-1000253}
- [fs] binfmt_elf.c: fix bug in loading of PIE binaries (Petr Matousek) [1492959 1492961] {CVE-2017-1000253}
[2.6.32-696.14.1]
- [fs] nfs: don't disconnect open-owner on NFS4ERR_BAD_SEQID (Dave Wysochanski) [1491123 1459636]
- [net] l2cap: prevent stack overflow on incoming bluetooth packet (Neil Horman) [1490060 1490062] {CVE-2017-1000251}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-6 | < 2.6.32-696.16.1.el6 |
- ID
- ELSA-2017-3200
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2017-3200.html
- Published
-
2017-11-15T00:00:00
(6 years ago) - Modified
-
2017-11-15T00:00:00
(6 years ago) - Rights
- Copyright 2017 Oracle, Inc.
- Other Advisories
-
- ALAS-2017-868
- DSA-3981-1
- ELSA-2017-2930
- ELSA-2017-3631
- ELSA-2017-3632
- ELSA-2017-3633
- ELSA-2017-3635
- ELSA-2018-4040
- ELSA-2018-4041
- ELSA-2018-4235
- FEDORA-2017-4336d64e21
- FEDORA-2017-73f71456d7
- FEDORA-2018-4ca01704a2
- FEDORA-2018-6367a17aa3
- FEDORA-2018-884a105c04
- RHSA-2017:2930
- RHSA-2017:2931
- RHSA-2017:3200
- SUSE-SU-2017:2131-1
- SUSE-SU-2017:2142-1
- SUSE-SU-2017:2150-1
- SUSE-SU-2017:2286-1
- SUSE-SU-2017:2423-1
- SUSE-SU-2017:2424-1
- SUSE-SU-2017:2436-1
- SUSE-SU-2017:2437-1
- SUSE-SU-2017:2438-1
- SUSE-SU-2017:2438-2
- SUSE-SU-2017:2439-1
- SUSE-SU-2017:2440-1
- SUSE-SU-2017:2441-1
- SUSE-SU-2017:2442-1
- SUSE-SU-2017:2443-1
- SUSE-SU-2017:2446-1
- SUSE-SU-2017:2447-1
- SUSE-SU-2017:2448-1
- SUSE-SU-2017:2454-1
- SUSE-SU-2017:2455-1
- SUSE-SU-2017:2456-1
- SUSE-SU-2017:2457-1
- SUSE-SU-2017:2458-1
- SUSE-SU-2017:2464-1
- SUSE-SU-2017:2465-1
- SUSE-SU-2017:2467-1
- SUSE-SU-2017:2469-1
- SUSE-SU-2017:2471-1
- SUSE-SU-2017:2472-1
- SUSE-SU-2017:2473-1
- SUSE-SU-2017:2474-1
- SUSE-SU-2017:2475-1
- SUSE-SU-2017:2476-1
- SUSE-SU-2017:2497-1
- SUSE-SU-2017:2498-1
- SUSE-SU-2017:2499-1
- SUSE-SU-2017:2500-1
- SUSE-SU-2017:2506-1
- SUSE-SU-2017:2508-1
- SUSE-SU-2017:2509-1
- SUSE-SU-2017:2510-1
- SUSE-SU-2017:2511-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2694-1
- SUSE-SU-2017:2775-1
- SUSE-SU-2017:2791-1
- SUSE-SU-2017:2813-1
- SUSE-SU-2017:2847-1
- SUSE-SU-2017:2869-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2017:2956-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2018:0011-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0180-1
- USN-3384-1
- USN-3384-2
- USN-3385-1
- USN-3385-2
- USN-3386-1
- USN-3386-2
- USN-3443-1
- USN-3443-2
- USN-3443-3
- USN-3444-1
- USN-3444-2
- USN-3445-1
- USN-3445-2
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2017-3200 | http://linux.oracle.com/errata/ELSA-2017-3200.html | |
CVE | CVE-2017-1000111 | http://linux.oracle.com/cve/CVE-2017-1000111.html | |
CVE | CVE-2017-14106 | http://linux.oracle.com/cve/CVE-2017-14106.html | |
CVE | CVE-2017-1000112 | http://linux.oracle.com/cve/CVE-2017-1000112.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-6 | oraclelinux | python-perf | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | oraclelinux | perf | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | oraclelinux | kernel | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | oraclelinux | kernel-headers | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | oraclelinux | kernel-firmware | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | oraclelinux | kernel-doc | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | oraclelinux | kernel-devel | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | oraclelinux | kernel-debug | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-debug-devel | < 2.6.32-696.16.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-6 | oraclelinux | kernel-abi-whitelists | < 2.6.32-696.16.1.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |