[ELSA-2017-3597] Unbreakable Enterprise kernel security update
[2.6.39-400.297.5]
- selinux: quiet the filesystem labeling behavior message (Paul Moore) [Orabug: 25721485]
- RDS/IB: active bonding port state fix for intfs added late (Mukesh Kacker) [Orabug: 25875426]
- HID: hid-cypress: validate length of report (Greg Kroah-Hartman) [Orabug: 25891914] {CVE-2017-7273}
- udf: Remove repeated loads blocksize (Jan Kara) [Orabug: 25905722] {CVE-2015-4167}
- udf: Check length of extended attributes and allocation descriptors (Jan Kara) [Orabug: 25905722] {CVE-2015-4167}
- udf: Verify i_size when loading inode (Jan Kara) [Orabug: 25905722] {CVE-2015-4167}
- btrfs: drop unused parameter from btrfs_item_nr (Ross Kirk) [Orabug: 25948102] {CVE-2014-9710}
- Btrfs: cleanup of function where fixup_low_keys() is called (Tsutomu Itoh) [Orabug: 25948102] {CVE-2014-9710}
- Btrfs: remove unused argument of fixup_low_keys() (Tsutomu Itoh) [Orabug: 25948102] {CVE-2014-9710}
- Btrfs: remove unused argument of btrfs_extend_item() (Tsutomu Itoh) [Orabug: 25948102] {CVE-2014-9710}
- Btrfs: add support for asserts (Josef Bacik) [Orabug: 25948102] {CVE-2014-9710}
- Btrfs: make xattr replace operations atomic (Filipe Manana) [Orabug: 25948102] {CVE-2014-9710}
- net: validate the range we feed to iov_iter_init() in sys_sendto/sys_recvfrom (Al Viro) [Orabug: 25948149] {CVE-2015-2686}
- xsigo: Compute node crash on FC failover (Joe Jin) [Orabug: 25965445]
- PCI: Prevent VPD access for QLogic ISP2722 (Ethan Zhao) [Orabug: 25975513]
- PCI: Prevent VPD access for buggy devices (Babu Moger) [Orabug: 25975513]
- ipv4: try to cache dst_entries which would cause a redirect (Hannes Frederic Sowa) [Orabug: 26032377] {CVE-2015-1465}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | < 2.6.39-400.297.5.el6uek |
pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | < 2.6.39-400.297.5.el6uek |
pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | < 2.6.39-400.297.5.el6uek |
pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | < 2.6.39-400.297.5.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | < 2.6.39-400.297.5.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | < 2.6.39-400.297.5.el6uek |
- ID
- ELSA-2017-3597
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2017-3597.html
- Published
-
2017-07-27T00:00:00
(7 years ago) - Modified
-
2017-07-27T00:00:00
(7 years ago) - Rights
- Copyright 2017 Oracle, Inc.
- Other Advisories
-
- DSA-3290-1
- DSA-3313-1
- ELSA-2017-3595
- FEDORA-2015-1657
- FEDORA-2015-1672
- SUSE-SU-2015:1071-1
- SUSE-SU-2015:1224-1
- SUSE-SU-2015:1324-1
- SUSE-SU-2015:1488-1
- SUSE-SU-2015:1489-1
- SUSE-SU-2015:1592-1
- SUSE-SU-2015:1611-1
- SUSE-SU-2015:1678-1
- SUSE-SU-2018:3746-1
- SUSE-SU-2018:3869-1
- SUSE-SU-2019:1289-1
- USN-2545-1
- USN-2546-1
- USN-2562-1
- USN-2563-1
- USN-2615-1
- USN-2616-1
- USN-2631-1
- USN-2632-1
- USN-2662-1
- USN-2663-1
- USN-2664-1
- USN-2666-1
- USN-3361-1
- USN-3406-1
- USN-3406-2
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2017-3597 | http://linux.oracle.com/errata/ELSA-2017-3597.html | |
CVE | CVE-2015-4167 | http://linux.oracle.com/cve/CVE-2015-4167.html | |
CVE | CVE-2017-7273 | http://linux.oracle.com/cve/CVE-2017-7273.html | |
CVE | CVE-2014-9710 | http://linux.oracle.com/cve/CVE-2014-9710.html | |
CVE | CVE-2015-2686 | http://linux.oracle.com/cve/CVE-2015-2686.html | |
CVE | CVE-2015-1465 | http://linux.oracle.com/cve/CVE-2015-1465.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.39-400.297.5.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.297.5.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.39-400.297.5.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.39-400.297.5.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.39-400.297.5.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.297.5.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |