[ELSA-2017-3508] Unbreakable Enterprise kernel security update
kernel-uek
[4.1.12-61.1.25]
- KEYS: Fix short sprintf buffer in /proc/keys show function (David Howells) [Orabug: 25306361] {CVE-2016-7042}
- nvme: Limit command retries (Keith Busch) [Orabug: 25374751]
- fs/proc/task_mmu.c: fix mm_access() mode parameter in pagemap_read() (Kenny Keslar) [Orabug: 25374977]
- tcp: fix use after free in tcp_xmit_retransmit_queue() (Eric Dumazet) [Orabug: 25374364] {CVE-2016-6828}
- tunnels: Don't apply GRO to multiple layers of encapsulation. (Jesse Gross) [Orabug: 25036352] {CVE-2016-8666}
- i40e: Don't notify client(s) for DCB changes on all VSIs (Neerav Parikh) [Orabug: 25046290]
- packet: fix race condition in packet_set_ring (Philip Pettersson) [Orabug: 25231617] {CVE-2016-8655}
- netlink: Fix dump skb leak/double free (Herbert Xu) [Orabug: 25231692] {CVE-2016-9806}
- ALSA: pcm : Call kill_fasync() in stream lock (Takashi Iwai) [Orabug: 25231720] {CVE-2016-9794}
- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet) [Orabug: 25231751] {CVE-2016-9793}
[4.1.12-61.1.24]
- rebuild bumping release
- ID
- ELSA-2017-3508
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2017-3508.html
- Published
-
2017-01-12T00:00:00
(7 years ago) - Modified
-
2017-01-12T00:00:00
(7 years ago) - Rights
- Copyright 2017 Oracle, Inc.
- Other Advisories
-
- ALAS-2016-718
- ALAS-2016-740
- ALAS-2016-762
- ALAS-2016-772
- ALAS-2017-782
- ASA-201612-6
- ASA-201612-7
- ASA-201612-8
- DSA-3659-1
- DSA-3696-1
- ELSA-2017-0036
- ELSA-2017-0086
- ELSA-2017-0386
- ELSA-2017-0817
- ELSA-2017-0933
- ELSA-2017-1842
- ELSA-2017-3509
- ELSA-2017-3510
- FEDORA-2016-107f03cc00
- FEDORA-2016-2e5ebfed6d
- FEDORA-2016-5aff4a6bbc
- FEDORA-2016-5cb5b4082d
- FEDORA-2016-5e24d8c350
- FEDORA-2016-723350dd75
- FEDORA-2016-f1adaaadc6
- RHSA-2016:2047
- RHSA-2016:2110
- RHSA-2016:2574
- RHSA-2017:0036
- RHSA-2017:0086
- RHSA-2017:0091
- RHSA-2017:0372
- RHSA-2017:0386
- RHSA-2017:0387
- RHSA-2017:0817
- RHSA-2017:0931
- RHSA-2017:0933
- RHSA-2017:1842
- RHSA-2017:2077
- SSA:2016-347-01
- SUSE-SU-2016:2629-1
- SUSE-SU-2016:2630-1
- SUSE-SU-2016:2631-1
- SUSE-SU-2016:2634-1
- SUSE-SU-2016:2635-1
- SUSE-SU-2016:2637-1
- SUSE-SU-2016:2638-1
- SUSE-SU-2016:2673-1
- SUSE-SU-2016:2674-1
- SUSE-SU-2016:2912-1
- SUSE-SU-2016:2976-1
- SUSE-SU-2016:3039-1
- SUSE-SU-2016:3049-1
- SUSE-SU-2016:3063-1
- SUSE-SU-2016:3069-1
- SUSE-SU-2016:3093-1
- SUSE-SU-2016:3094-1
- SUSE-SU-2016:3096-1
- SUSE-SU-2016:3098-1
- SUSE-SU-2016:3100-1
- SUSE-SU-2016:3104-1
- SUSE-SU-2016:3109-1
- SUSE-SU-2016:3111-1
- SUSE-SU-2016:3112-1
- SUSE-SU-2016:3113-1
- SUSE-SU-2016:3116-1
- SUSE-SU-2016:3117-1
- SUSE-SU-2016:3119-1
- SUSE-SU-2016:3146-1
- SUSE-SU-2016:3169-1
- SUSE-SU-2016:3183-1
- SUSE-SU-2016:3188-1
- SUSE-SU-2016:3197-1
- SUSE-SU-2016:3203-1
- SUSE-SU-2016:3205-1
- SUSE-SU-2016:3206-1
- SUSE-SU-2016:3217-1
- SUSE-SU-2016:3247-1
- SUSE-SU-2016:3248-1
- SUSE-SU-2016:3249-1
- SUSE-SU-2016:3252-1
- SUSE-SU-2016:3304-1
- SUSE-SU-2017:0181-1
- SUSE-SU-2017:0226-1
- SUSE-SU-2017:0227-1
- SUSE-SU-2017:0228-1
- SUSE-SU-2017:0229-1
- SUSE-SU-2017:0230-1
- SUSE-SU-2017:0231-1
- SUSE-SU-2017:0233-1
- SUSE-SU-2017:0234-1
- SUSE-SU-2017:0235-1
- SUSE-SU-2017:0244-1
- SUSE-SU-2017:0245-1
- SUSE-SU-2017:0246-1
- SUSE-SU-2017:0247-1
- SUSE-SU-2017:0248-1
- SUSE-SU-2017:0249-1
- SUSE-SU-2017:0267-1
- SUSE-SU-2017:0268-1
- SUSE-SU-2017:0278-1
- SUSE-SU-2017:0293-1
- SUSE-SU-2017:0294-1
- SUSE-SU-2017:0303-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0407-1
- SUSE-SU-2017:0437-1
- SUSE-SU-2017:0464-1
- SUSE-SU-2017:0471-1
- SUSE-SU-2017:0494-1
- SUSE-SU-2017:0575-1
- SUSE-SU-2017:1102-1
- USN-3097-1
- USN-3097-2
- USN-3098-1
- USN-3098-2
- USN-3099-1
- USN-3099-2
- USN-3099-3
- USN-3099-4
- USN-3126-1
- USN-3126-2
- USN-3127-1
- USN-3127-2
- USN-3128-1
- USN-3128-2
- USN-3128-3
- USN-3129-1
- USN-3129-2
- USN-3149-1
- USN-3149-2
- USN-3150-1
- USN-3150-2
- USN-3151-1
- USN-3151-2
- USN-3151-3
- USN-3151-4
- USN-3152-1
- USN-3152-2
- USN-3161-3
- USN-3167-1
- USN-3167-2
- USN-3168-1
- USN-3168-2
- USN-3169-1
- USN-3169-2
- USN-3169-3
- USN-3169-4
- USN-3170-1
- USN-3170-2
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2017-3508 | http://linux.oracle.com/errata/ELSA-2017-3508.html | |
CVE | CVE-2016-6828 | http://linux.oracle.com/cve/CVE-2016-6828.html | |
CVE | CVE-2016-7042 | http://linux.oracle.com/cve/CVE-2016-7042.html | |
CVE | CVE-2016-8666 | http://linux.oracle.com/cve/CVE-2016-8666.html | |
CVE | CVE-2016-8655 | http://linux.oracle.com/cve/CVE-2016-8655.html | |
CVE | CVE-2016-9806 | http://linux.oracle.com/cve/CVE-2016-9806.html | |
CVE | CVE-2016-9794 | http://linux.oracle.com/cve/CVE-2016-9794.html | |
CVE | CVE-2016-9793 | http://linux.oracle.com/cve/CVE-2016-9793.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-61.1.25.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-61.1.25.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-61.1.25.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-61.1.25.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-61.1.25.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-61.1.25.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-61.1.25.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-61.1.25.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-61.1.25.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-61.1.25.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-61.1.25.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-61.1.25.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-4.1.12-61.1.25.el7uek?distro=oraclelinux-7 | oraclelinux | dtrace-modules-4.1.12-61.1.25.el7uek | < 0.5.3-2.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-4.1.12-61.1.25.el6uek?distro=oraclelinux-6 | oraclelinux | dtrace-modules-4.1.12-61.1.25.el6uek | < 0.5.3-2.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |