[ELSA-2017-3535] Unbreakable Enterprise kernel security update
[2.6.39-400.294.6]
- RHEL: complement upstream workaround for CVE-2016-10142. (Quentin Casasnovas) [Orabug: 25765786] {CVE-2016-10142} {CVE-2016-10142}
[2.6.39-400.294.5]
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766914] {CVE-2016-8399}
- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765786] {CVE-2016-10142}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765448] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25752011] {CVE-2017-7187}
[2.6.39-400.294.4]
- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696689] {CVE-2017-2636}
- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696689] {CVE-2017-2636}
- drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696689] {CVE-2017-2636}
- list: introduce list_first_entry_or_null (Jiri Pirko) [Orabug: 25696689] {CVE-2017-2636}
- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451538] {CVE-2016-8633}
- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463929] {CVE-2016-3672}
- x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463929] {CVE-2016-3672}
- sg_start_req(): make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490377] {CVE-2015-5707}
- tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507232] {CVE-2016-8645}
- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507232] {CVE-2016-8645}
- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507330] {CVE-2016-7425}
- x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 25507375] {CVE-2015-4700}
- net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512417] {CVE-2016-4580}
- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512472] {CVE-2016-3140}
- net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682437] {CVE-2017-6345}
- ID
- ELSA-2017-3535
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2017-3535.html
- Published
-
2017-03-31T00:00:00
(7 years ago) - Modified
-
2017-03-31T00:00:00
(7 years ago) - Rights
- Copyright 2017 Oracle, Inc.
- Other Advisories
-
- ALAS-2016-694
- ALAS-2016-772
- ALAS-2017-782
- ALAS-2017-786
- ALAS-2017-828
- ASA-201702-17
- ASA-201702-18
- ASA-201703-13
- ASA-201703-6
- ASA-201703-8
- DSA-3329-1
- DSA-3607-1
- DSA-3696-1
- DSA-3804-1
- ELSA-2015-1778
- ELSA-2017-0817
- ELSA-2017-0892
- ELSA-2017-0933
- ELSA-2017-1842
- ELSA-2017-2930
- ELSA-2017-3533
- ELSA-2017-3534
- ELSA-2018-1062
- FEDORA-2016-02db2f32fd
- FEDORA-2016-29cde72f15
- FEDORA-2016-3548475bca
- FEDORA-2016-373c063e79
- FEDORA-2016-76706f51a7
- FEDORA-2016-7e602c0e5e
- FEDORA-2016-81fd1b03aa
- FEDORA-2016-8e858f96b8
- FEDORA-2016-e5b72816d0
- FEDORA-2016-ed5110c4bb
- FEDORA-2016-ee3a114958
- FEDORA-2016-f3d1f79398
- FEDORA-2017-3a9ec92dd6
- FEDORA-2017-502cf68d68
- RHSA-2015:1778
- RHSA-2015:1788
- RHSA-2017:0817
- RHSA-2017:0892
- RHSA-2017:0931
- RHSA-2017:0933
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2930
- RHSA-2017:2931
- RHSA-2018:0676
- RHSA-2018:1062
- SUSE-SU-2015:1224-1
- SUSE-SU-2015:1478-1
- SUSE-SU-2015:1487-1
- SUSE-SU-2015:1488-1
- SUSE-SU-2015:1489-1
- SUSE-SU-2015:1490-1
- SUSE-SU-2015:1491-1
- SUSE-SU-2015:1592-1
- SUSE-SU-2015:1611-1
- SUSE-SU-2015:1678-1
- SUSE-SU-2015:2084-1
- SUSE-SU-2015:2085-1
- SUSE-SU-2015:2086-1
- SUSE-SU-2015:2087-1
- SUSE-SU-2015:2089-1
- SUSE-SU-2015:2090-1
- SUSE-SU-2015:2091-1
- SUSE-SU-2015:2167-1
- SUSE-SU-2016:0585-1
- SUSE-SU-2016:0785-1
- SUSE-SU-2016:1203-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1690-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1707-1
- SUSE-SU-2016:1764-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:2074-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2016:2912-1
- SUSE-SU-2016:2976-1
- SUSE-SU-2016:3069-1
- SUSE-SU-2016:3304-1
- SUSE-SU-2017:0181-1
- SUSE-SU-2017:0227-1
- SUSE-SU-2017:0228-1
- SUSE-SU-2017:0232-1
- SUSE-SU-2017:0293-1
- SUSE-SU-2017:0307-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0407-1
- SUSE-SU-2017:0437-1
- SUSE-SU-2017:0464-1
- SUSE-SU-2017:0471-1
- SUSE-SU-2017:0494-1
- SUSE-SU-2017:0864-1
- SUSE-SU-2017:0865-1
- SUSE-SU-2017:0866-1
- SUSE-SU-2017:0912-1
- SUSE-SU-2017:0913-1
- SUSE-SU-2017:1102-1
- SUSE-SU-2017:1183-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1301-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1990-1
- SUSE-SU-2017:2043-1
- SUSE-SU-2017:2049-1
- SUSE-SU-2017:2060-1
- SUSE-SU-2017:2061-1
- SUSE-SU-2017:2062-1
- SUSE-SU-2017:2063-1
- SUSE-SU-2017:2065-1
- SUSE-SU-2017:2067-1
- SUSE-SU-2017:2068-1
- SUSE-SU-2017:2072-1
- SUSE-SU-2017:2073-1
- SUSE-SU-2017:2088-1
- SUSE-SU-2017:2092-1
- SUSE-SU-2017:2093-1
- SUSE-SU-2017:2095-1
- SUSE-SU-2017:2096-1
- SUSE-SU-2017:2099-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2525-1
- USN-2664-1
- USN-2666-1
- USN-2678-1
- USN-2679-1
- USN-2680-1
- USN-2681-1
- USN-2683-1
- USN-2684-1
- USN-2733-1
- USN-2734-1
- USN-2737-1
- USN-2738-1
- USN-2750-1
- USN-2759-1
- USN-2760-1
- USN-2965-1
- USN-2965-2
- USN-2965-3
- USN-2965-4
- USN-2968-1
- USN-2968-2
- USN-2970-1
- USN-2971-1
- USN-2971-2
- USN-2971-3
- USN-2989-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-3000-1
- USN-3001-1
- USN-3002-1
- USN-3003-1
- USN-3004-1
- USN-3016-1
- USN-3016-2
- USN-3016-3
- USN-3016-4
- USN-3017-1
- USN-3017-2
- USN-3017-3
- USN-3018-1
- USN-3018-2
- USN-3019-1
- USN-3020-1
- USN-3021-1
- USN-3021-2
- USN-3144-1
- USN-3144-2
- USN-3145-1
- USN-3145-2
- USN-3146-1
- USN-3146-2
- USN-3147-1
- USN-3161-1
- USN-3161-2
- USN-3161-3
- USN-3161-4
- USN-3162-1
- USN-3162-2
- USN-3189-1
- USN-3189-2
- USN-3190-1
- USN-3190-2
- USN-3208-1
- USN-3208-2
- USN-3209-1
- USN-3218-1
- USN-3219-1
- USN-3219-2
- USN-3220-1
- USN-3220-2
- USN-3220-3
- USN-3221-1
- USN-3221-2
- USN-3265-1
- USN-3265-2
- USN-3290-1
- USN-3291-1
- USN-3291-2
- USN-3291-3
- USN-3293-1
- USN-3360-1
- USN-3360-2
- USN-3361-1
- USN-3422-1
- USN-3422-2
- USN-3445-1
- USN-3445-2
- USN-3754-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.39-400.294.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.39-400.294.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.294.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.294.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.39-400.294.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.39-400.294.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.39-400.294.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.39-400.294.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.39-400.294.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.39-400.294.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.294.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.294.6.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |