[ELSA-2017-3533] Unbreakable Enterprise kernel security update

Severity Important
Affected Packages 14
CVEs 22

kernel-uek
[4.1.12-61.1.33]
- Revert 'x86/mm: Expand the exception table logic to allow new handling options' (Brian Maly) [Orabug: 25790387] {CVE-2016-9644}
- Revert 'fix minor infoleak in get_user_ex()' (Brian Maly) [Orabug: 25790387] {CVE-2016-9644}

[4.1.12-61.1.32]
- x86/mm: Expand the exception table logic to allow new handling options (Tony Luck) [Orabug: 25790387] {CVE-2016-9644}

[4.1.12-61.1.31]
- rebuild bumping release

[4.1.12-61.1.30]
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766898] {CVE-2016-8399} {CVE-2016-8399}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765436] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25751984] {CVE-2017-7187}

[4.1.12-61.1.29]
- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696677] {CVE-2017-2636}
- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696677] {CVE-2017-2636}
- If Slot Status indicates changes in both Data Link Layer Status and Presence Detect, prioritize the Link status change. (Jack Vogel) [Orabug: 25353783]
- PCI: pciehp: Leave power indicator on when enabling already-enabled slot (Ashok Raj) [Orabug: 25353783]
- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451520] {CVE-2016-8633}
- usbnet: cleanup after bind() in probe() (Oliver Neukum) [Orabug: 25463898] {CVE-2016-3951}
- cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind (Bjorn Mork) [Orabug: 25463898] {CVE-2016-3951}
- cdc_ncm: Add support for moving NDP to end of NCM frame (Enrico Mioso) [Orabug: 25463898] {CVE-2016-3951}
- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463918] {CVE-2016-3672}
- kvm: fix page struct leak in handle_vmon (Paolo Bonzini) [Orabug: 25507133] {CVE-2017-2596}
- crypto: mcryptd - Check mcryptd algorithm compatibility (tim) [Orabug: 25507153] {CVE-2016-10147}
- kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF) (Jim Mattson) [Orabug: 25507188] {CVE-2016-9588}
- KVM: x86: drop error recovery in em_jmp_far and em_ret_far (Radim Krcmar) [Orabug: 25507213] {CVE-2016-9756}
- tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507226] {CVE-2016-8645}
- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507226] {CVE-2016-8645}
- tipc: check minimum bearer MTU (Michal Kubecek) [Orabug: 25507239] {CVE-2016-8632} {CVE-2016-8632}
- fix minor infoleak in get_user_ex() (Al Viro) [Orabug: 25507269] {CVE-2016-9178}
- scsi: arcmsr: Simplify user_len checking (Borislav Petkov) [Orabug: 25507319] {CVE-2016-7425}
- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507319] {CVE-2016-7425}
- tmpfs: clear S_ISGID when setting posix ACLs (Gu Zheng) [Orabug: 25507341] {CVE-2016-7097} {CVE-2016-7097}
- posix_acl: Clear SGID bit when setting file permissions (Jan Kara) [Orabug: 25507341] {CVE-2016-7097} {CVE-2016-7097}
- ext2: convert to mbcache2 (Jan Kara) [Orabug: 25512366] {CVE-2015-8952}
- ext4: convert to mbcache2 (Jan Kara) [Orabug: 25512366] {CVE-2015-8952}
- mbcache2: reimplement mbcache (Jan Kara) [Orabug: 25512366] {CVE-2015-8952}
- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512466] {CVE-2016-3140}
- net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682419] {CVE-2017-6345}
- net/mlx4_core: Disallow creation of RAW QPs on a VF (Eli Cohen) [Orabug: 25697847]
- ipv4: keep skb->dst around in presence of IP options (Eric Dumazet) [Orabug: 25698300] {CVE-2017-5970}
- perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race (Peter Zijlstra) [Orabug: 25698751] {CVE-2017-6001}
- ip6_gre: fix ip6gre_err() invalid reads (Eric Dumazet) [Orabug: 25699015] {CVE-2017-5897}
- mpt3sas: Dont spam logs if logging level is 0 (Johannes Thumshirn) [Orabug: 25699035]
- xen-netfront: cast grant table reference first to type int (Dongli Zhang)

- xen-netfront: do not cast grant table reference to signed short (Dongli Zhang)

ID
ELSA-2017-3533
Severity
important
URL
https://linux.oracle.com/errata/ELSA-2017-3533.html
Published
2017-03-31T00:00:00
(7 years ago)
Modified
2017-03-31T00:00:00
(7 years ago)
Rights
Copyright 2017 Oracle, Inc.
Other Advisories
Source # ID Name URL
elsa ELSA-2017-3533 http://linux.oracle.com/errata/ELSA-2017-3533.html
CVE CVE-2016-10088 http://linux.oracle.com/cve/CVE-2016-10088.html
CVE CVE-2016-7097 http://linux.oracle.com/cve/CVE-2016-7097.html
CVE CVE-2016-8399 http://linux.oracle.com/cve/CVE-2016-8399.html
CVE CVE-2017-7187 http://linux.oracle.com/cve/CVE-2017-7187.html
CVE CVE-2017-2636 http://linux.oracle.com/cve/CVE-2017-2636.html
CVE CVE-2016-10147 http://linux.oracle.com/cve/CVE-2016-10147.html
CVE CVE-2016-9588 http://linux.oracle.com/cve/CVE-2016-9588.html
CVE CVE-2016-7425 http://linux.oracle.com/cve/CVE-2016-7425.html
CVE CVE-2016-8633 http://linux.oracle.com/cve/CVE-2016-8633.html
CVE CVE-2016-3951 http://linux.oracle.com/cve/CVE-2016-3951.html
CVE CVE-2016-3672 http://linux.oracle.com/cve/CVE-2016-3672.html
CVE CVE-2017-2596 http://linux.oracle.com/cve/CVE-2017-2596.html
CVE CVE-2016-9756 http://linux.oracle.com/cve/CVE-2016-9756.html
CVE CVE-2016-8645 http://linux.oracle.com/cve/CVE-2016-8645.html
CVE CVE-2016-8632 http://linux.oracle.com/cve/CVE-2016-8632.html
CVE CVE-2016-9178 http://linux.oracle.com/cve/CVE-2016-9178.html
CVE CVE-2015-8952 http://linux.oracle.com/cve/CVE-2015-8952.html
CVE CVE-2016-3140 http://linux.oracle.com/cve/CVE-2016-3140.html
CVE CVE-2017-6345 http://linux.oracle.com/cve/CVE-2017-6345.html
CVE CVE-2017-5970 http://linux.oracle.com/cve/CVE-2017-5970.html
CVE CVE-2017-6001 http://linux.oracle.com/cve/CVE-2017-6001.html
CVE CVE-2017-5897 http://linux.oracle.com/cve/CVE-2017-5897.html
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 oraclelinux kernel-uek < 4.1.12-61.1.33.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 oraclelinux kernel-uek < 4.1.12-61.1.33.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 oraclelinux kernel-uek-firmware < 4.1.12-61.1.33.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 oraclelinux kernel-uek-firmware < 4.1.12-61.1.33.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 oraclelinux kernel-uek-doc < 4.1.12-61.1.33.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 oraclelinux kernel-uek-doc < 4.1.12-61.1.33.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 oraclelinux kernel-uek-devel < 4.1.12-61.1.33.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 oraclelinux kernel-uek-devel < 4.1.12-61.1.33.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 oraclelinux kernel-uek-debug < 4.1.12-61.1.33.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 oraclelinux kernel-uek-debug < 4.1.12-61.1.33.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 oraclelinux kernel-uek-debug-devel < 4.1.12-61.1.33.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 oraclelinux kernel-uek-debug-devel < 4.1.12-61.1.33.el6uek oraclelinux-6
Affected pkg:rpm/oraclelinux/dtrace-modules-4.1.12-61.1.33.el7uek?distro=oraclelinux-7 oraclelinux dtrace-modules-4.1.12-61.1.33.el7uek < 0.5.3-2.el7 oraclelinux-7
Affected pkg:rpm/oraclelinux/dtrace-modules-4.1.12-61.1.33.el6uek?distro=oraclelinux-6 oraclelinux dtrace-modules-4.1.12-61.1.33.el6uek < 0.5.3-2.el6 oraclelinux-6
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...