[ELSA-2017-3567] Unbreakable Enterprise kernel security update
[2.6.39-400.295.2]
- nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) [Orabug: 25986995] {CVE-2017-7895}
[2.6.39-400.295.1]
- ocfs2/o2net: o2net_listen_data_ready should do nothing if socket state is not TCP_LISTEN (Tariq Saeed) [Orabug: 25510857]
- IB/CORE: sync the resouce access in fmr_pool (Wengang Wang) [Orabug: 23750748]
- ipv6: Skip XFRM lookup if dst_entry in socket cache is valid (Jakub Sitnicki) [Orabug: 25534688]
- uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug: 25549845]
- ksplice: add sysctls for determining Ksplice features. (Jamie Iles) [Orabug: 25549845]
- signal: protect SIGNAL_UNKILLABLE from unintentional clearing. (Jamie Iles) [Orabug: 25549845]
- KVM: x86: fix emulation of 'MOV SS, null selector' (Paolo Bonzini) [Orabug: 25719676] {CVE-2017-2583} {CVE-2017-2583}
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo Ricardo Leitner) [Orabug: 25719811] {CVE-2017-5986}
- tcp: avoid infinite loop in tcp_splice_read() (Eric Dumazet) [Orabug: 25720815] {CVE-2017-6214}
- USB: visor: fix null-deref at probe (Johan Hovold) [Orabug: 25796604] {CVE-2016-2782}
- ipc/shm: Fix shmat mmap nil-page protection (Davidlohr Bueso) [Orabug: 25797014] {CVE-2017-5669}
- vhost: actually track log eventfd file (Marc-Andre Lureau) [Orabug: 25797056] {CVE-2015-6252}
- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder (Andy Whitcroft) [Orabug: 25814664] {CVE-2017-7184}
- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window (Andy Whitcroft) [Orabug: 25814664] {CVE-2017-7184}
- KEYS: Remove key_type::match in favour of overriding default by match_preparse (David Howells) [Orabug: 25823965] {CVE-2017-2647} {CVE-2017-2647}
- USB: whiteheat: fix potential null-deref at probe (Johan Hovold) [Orabug: 25825107] {CVE-2015-5257}
- RDS: fix race condition when sending a message on unbound socket (Quentin Casasnovas) [Orabug: 25871048] {CVE-2015-6937} {CVE-2015-6937}
- udf: Check path length when reading symlink (Jan Kara) [Orabug: 25871104] {CVE-2015-9731}
- udf: Treat symlink component of type 2 as / (Jan Kara) [Orabug: 25871104] {CVE-2015-9731}
- udp: properly support MSG_PEEK with truncated buffers (Eric Dumazet) [Orabug: 25874741] {CVE-2016-10229}
- block: fix use-after-free in seq file (Vegard Nossum) [Orabug: 25877531] {CVE-2016-7910}
- RHEL: complement upstream workaround for CVE-2016-10142. (Quentin Casasnovas) [Orabug: 25765786] {CVE-2016-10142} {CVE-2016-10142}
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766914] {CVE-2016-8399}
- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765786] {CVE-2016-10142}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765448] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25752011] {CVE-2017-7187}
- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696689] {CVE-2017-2636}
- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696689] {CVE-2017-2636}
- drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696689] {CVE-2017-2636}
- list: introduce list_first_entry_or_null (Jiri Pirko) [Orabug: 25696689] {CVE-2017-2636}
- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451538] {CVE-2016-8633}
- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463929] {CVE-2016-3672}
- x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463929] {CVE-2016-3672}
- sg_start_req(): make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490377] {CVE-2015-5707}
- tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507232] {CVE-2016-8645}
- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507232] {CVE-2016-8645}
- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507330] {CVE-2016-7425}
- x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 25507375] {CVE-2015-4700}
- net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512417] {CVE-2016-4580}
- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512472] {CVE-2016-3140}
- net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682437] {CVE-2017-6345}
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Andrey Konovalov) [Orabug: 25598277] {CVE-2017-6074}
- vfs: read file_handle only once in handle_to_path (Sasha Levin) [Orabug: 25388709] {CVE-2015-1420}
- crypto: algif_hash - Only export and import on sockets with data (Herbert Xu) [Orabug: 25417807]
- USB: usbfs: fix potential infoleak in devio (Kangjie Lu) [Orabug: 25462763] {CVE-2016-4482}
- net: fix infoleak in llc (Kangjie Lu) [Orabug: 25462811] {CVE-2016-4485}
- af_unix: Guard against other == sk in unix_dgram_sendmsg (Rainer Weikusat) [Orabug: 25464000] {CVE-2013-7446}
- unix: avoid use-after-free in ep_remove_wait_queue (Rainer Weikusat) [Orabug: 25464000] {CVE-2013-7446}
- ID
- ELSA-2017-3567
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2017-3567.html
- Published
-
2017-05-16T00:00:00
(7 years ago) - Modified
-
2017-05-16T00:00:00
(7 years ago) - Rights
- Copyright 2017 Oracle, Inc.
- Other Advisories
-
- ALAS-2017-805
- ALAS-2017-811
- ALAS-2017-814
- ASA-201701-32
- ASA-201701-35
- ASA-201701-38
- ASA-201702-17
- ASA-201702-18
- DSA-3364-1
- DSA-3372-1
- DSA-3791-1
- DSA-3804-1
- DSA-3886-1
- ELSA-2015-3098
- ELSA-2017-1308
- ELSA-2017-1372
- ELSA-2017-1615
- ELSA-2017-1723
- ELSA-2017-1842
- ELSA-2017-2412
- ELSA-2017-2930
- ELSA-2017-3539
- ELSA-2017-3565
- ELSA-2017-3566
- ELSA-2017-3576
- ELSA-2020-3548
- FEDORA-2015-16417
- FEDORA-2015-16440
- FEDORA-2015-16441
- FEDORA-2015-3c8c8ba072
- FEDORA-2015-d7e074ba30
- FEDORA-2015-dcc260f2f2
- FEDORA-2017-02174df32f
- FEDORA-2017-18ce368ba3
- FEDORA-2017-2e1f3694b2
- FEDORA-2017-387ff46a66
- FEDORA-2017-93dec9eba5
- FEDORA-2017-ad045f80ac
- FEDORA-2017-b9b1ac0d15
- FEDORA-2017-e6012e74b6
- FEDORA-2017-fb89ca752a
- RHSA-2017:1308
- RHSA-2017:1372
- RHSA-2017:1615
- RHSA-2017:1616
- RHSA-2017:1723
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2930
- RHSA-2017:2931
- RHSA-2020:3548
- SUSE-SU-2015:1678-1
- SUSE-SU-2015:1727-1
- SUSE-SU-2015:2108-1
- SUSE-SU-2015:2167-1
- SUSE-SU-2015:2339-1
- SUSE-SU-2015:2350-1
- SUSE-SU-2016:0335-1
- SUSE-SU-2016:0337-1
- SUSE-SU-2016:0354-1
- SUSE-SU-2016:0380-1
- SUSE-SU-2016:0381-1
- SUSE-SU-2016:0383-1
- SUSE-SU-2016:0384-1
- SUSE-SU-2016:0386-1
- SUSE-SU-2016:0387-1
- SUSE-SU-2016:0434-1
- SUSE-SU-2016:1019-1
- SUSE-SU-2016:1203-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1690-1
- SUSE-SU-2016:1707-1
- SUSE-SU-2016:1764-1
- SUSE-SU-2016:2074-1
- SUSE-SU-2017:0407-1
- SUSE-SU-2017:0464-1
- SUSE-SU-2017:0471-1
- SUSE-SU-2017:0575-1
- SUSE-SU-2017:0864-1
- SUSE-SU-2017:0865-1
- SUSE-SU-2017:0866-1
- SUSE-SU-2017:0867-1
- SUSE-SU-2017:0868-1
- SUSE-SU-2017:0869-1
- SUSE-SU-2017:0870-1
- SUSE-SU-2017:0871-1
- SUSE-SU-2017:0872-1
- SUSE-SU-2017:0873-1
- SUSE-SU-2017:0874-1
- SUSE-SU-2017:0875-1
- SUSE-SU-2017:0876-1
- SUSE-SU-2017:0877-1
- SUSE-SU-2017:0878-1
- SUSE-SU-2017:0879-1
- SUSE-SU-2017:0880-1
- SUSE-SU-2017:0881-1
- SUSE-SU-2017:0882-1
- SUSE-SU-2017:0883-1
- SUSE-SU-2017:0884-1
- SUSE-SU-2017:0885-1
- SUSE-SU-2017:0886-1
- SUSE-SU-2017:0887-1
- SUSE-SU-2017:0888-1
- SUSE-SU-2017:0889-1
- SUSE-SU-2017:1183-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1301-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1990-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2389-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2920-1
- USN-2748-1
- USN-2749-1
- USN-2751-1
- USN-2752-1
- USN-2759-1
- USN-2760-1
- USN-2773-1
- USN-2774-1
- USN-2775-1
- USN-2776-1
- USN-2777-1
- USN-2778-1
- USN-2779-1
- USN-2792-1
- USN-2794-1
- USN-2795-1
- USN-2796-1
- USN-2797-1
- USN-2798-1
- USN-2799-1
- USN-2929-1
- USN-2929-2
- USN-2930-1
- USN-2930-2
- USN-2930-3
- USN-2932-1
- USN-2948-1
- USN-2967-1
- USN-2967-2
- USN-3208-1
- USN-3208-2
- USN-3248-1
- USN-3249-1
- USN-3249-2
- USN-3250-1
- USN-3250-2
- USN-3251-1
- USN-3251-2
- USN-3264-1
- USN-3264-2
- USN-3265-1
- USN-3265-2
- USN-3266-1
- USN-3266-2
- USN-3312-1
- USN-3312-2
- USN-3314-1
- USN-3359-1
- USN-3360-1
- USN-3360-2
- USN-3361-1
- USN-3422-1
- USN-3422-2
- USN-3583-1
- USN-3583-2
- USN-3754-1
- USN-3849-1
- USN-3849-2
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2017-3567 | http://linux.oracle.com/errata/ELSA-2017-3567.html | |
CVE | CVE-2015-6937 | http://linux.oracle.com/cve/CVE-2015-6937.html | |
CVE | CVE-2017-2583 | http://linux.oracle.com/cve/CVE-2017-2583.html | |
CVE | CVE-2017-6214 | http://linux.oracle.com/cve/CVE-2017-6214.html | |
CVE | CVE-2017-7184 | http://linux.oracle.com/cve/CVE-2017-7184.html | |
CVE | CVE-2017-5986 | http://linux.oracle.com/cve/CVE-2017-5986.html | |
CVE | CVE-2017-7895 | http://linux.oracle.com/cve/CVE-2017-7895.html | |
CVE | CVE-2015-6252 | http://linux.oracle.com/cve/CVE-2015-6252.html | |
CVE | CVE-2017-2647 | http://linux.oracle.com/cve/CVE-2017-2647.html | |
CVE | CVE-2015-5257 | http://linux.oracle.com/cve/CVE-2015-5257.html | |
CVE | CVE-2015-9731 | http://linux.oracle.com/cve/CVE-2015-9731.html | |
CVE | CVE-2016-2782 | http://linux.oracle.com/cve/CVE-2016-2782.html | |
CVE | CVE-2017-5669 | http://linux.oracle.com/cve/CVE-2017-5669.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.39-400.295.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.39-400.295.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.295.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.295.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.39-400.295.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.39-400.295.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.39-400.295.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.39-400.295.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.39-400.295.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.39-400.295.2.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.295.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.295.2.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |