[ELSA-2017-3637] Unbreakable Enterprise kernel security update
[2.6.39-400.297.12]
- xsigo: [backport] Fix race in freeing aged Forwarding tables (Pradeep Gopanapalli) [Orabug: 24823234]
- ocfs2: fix deadlock issue when taking inode lock at vfs entry points (Eric Ren) [Orabug: 25671723]
- ocfs2/dlmglue: prepare tracking logic to avoid recursive cluster lock (Eric Ren) [Orabug: 25671723]
- net/packet: fix overflow in check for tp_reserve (Andrey Konovalov) [Orabug: 26143563] {CVE-2017-7308}
- net/packet: fix overflow in check for tp_frame_nr (Andrey Konovalov) [Orabug: 26143563] {CVE-2017-7308}
- char: lp: fix possible integer overflow in lp_setup() (Willy Tarreau) [Orabug: 26403941] {CVE-2017-1000363}
- ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380}
- ALSA: timer: Fix race between read and ioctl (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380}
- ALSA: timer: fix NULL pointer dereference in read()/ioctl() race (Vegard Nossum) [Orabug: 26403958] {CVE-2017-1000380}
- ALSA: timer: Fix negative queue usage by racy accesses (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380}
- ALSA: timer: Fix race at concurrent reads (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380}
- ALSA: timer: Fix race among timer ioctls (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380}
- ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt() (Ben Hutchings) [Orabug: 26403974] {CVE-2017-9074}
- ipv6: Check ip6_find_1stfragopt() return value properly. (David S. Miller) [Orabug: 26403974] {CVE-2017-9074}
- ipv6: Prevent overrun when parsing v6 header options (Craig Gallek) [Orabug: 26403974] {CVE-2017-9074}
- ipv6/dccp: do not inherit ipv6_mc_list from parent (WANG Cong) [Orabug: 26404007] {CVE-2017-9077}
- aio: mark AIO pseudo-fs noexec (Jann Horn) [Orabug: 26643601] {CVE-2016-10044}
- vfs: Commit to never having exectuables on proc and sysfs. (Eric W. Biederman) [Orabug: 26643601] {CVE-2016-10044}
- vfs, writeback: replace FS_CGROUP_WRITEBACK with SB_I_CGROUPWB (Tejun Heo) [Orabug: 26643601] {CVE-2016-10044}
- x86/acpi: Prevent out of bound access caused by broken ACPI tables (Seunghun Han) [Orabug: 26643652] {CVE-2017-11473}
- sctp: do not inherit ipv6_{mc|ac|fl}_list from parent (Eric Dumazet) [Orabug: 26650889] {CVE-2017-9075}
- saa7164: fix double fetch PCIe access condition (Steven Toth) [Orabug: 26675148] {CVE-2017-8831}
- saa7164: fix sparse warnings (Hans Verkuil) [Orabug: 26675148] {CVE-2017-8831}
- saa7164: get rid of warning: no previous prototype (Mauro Carvalho Chehab) [Orabug: 26675148] {CVE-2017-8831}
- [scsi] lpfc 8.3.44: Fix kernel panics from corrupted ndlp (James Smart) [Orabug: 26765341]
- timerfd: Protect the might cancel mechanism proper (Thomas Gleixner) [Orabug: 26899791] {CVE-2017-10661}
- scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly (Xin Long) [Orabug: 26988628] {CVE-2017-14489}
- ID
- ELSA-2017-3637
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2017-3637.html
- Published
-
2017-11-02T00:00:00
(6 years ago) - Modified
-
2017-11-02T00:00:00
(6 years ago) - Rights
- Copyright 2017 Oracle, Inc.
- Other Advisories
-
- ALAS-2017-828
- ALAS-2017-846
- ALAS-2017-870
- DSA-3886-1
- DSA-3945-1
- DSA-3981-1
- ELSA-2017-1308
- ELSA-2017-1842
- ELSA-2017-3315
- ELSA-2017-3579
- ELSA-2017-3580
- ELSA-2017-3595
- ELSA-2017-3635
- ELSA-2017-3636
- ELSA-2018-0169
- ELSA-2018-1854
- ELSA-2018-3083
- ELSA-2018-4040
- FEDORA-2017-26c9ecd7a4
- FEDORA-2017-273b67d5ee
- FEDORA-2017-39b5facda0
- FEDORA-2017-544eef948f
- FEDORA-2017-6554692044
- FEDORA-2017-6f06be3fe9
- FEDORA-2017-85744f8aa9
- FEDORA-2017-8e7549fb91
- RHSA-2017:1298
- RHSA-2017:1308
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:3315
- RHSA-2017:3322
- RHSA-2018:0169
- RHSA-2018:1854
- RHSA-2018:3083
- RHSA-2018:3096
- SUSE-SU-2017:1059-1
- SUSE-SU-2017:1060-1
- SUSE-SU-2017:1064-1
- SUSE-SU-2017:1183-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1277-1
- SUSE-SU-2017:1278-1
- SUSE-SU-2017:1279-1
- SUSE-SU-2017:1280-1
- SUSE-SU-2017:1281-1
- SUSE-SU-2017:1283-1
- SUSE-SU-2017:1284-1
- SUSE-SU-2017:1285-1
- SUSE-SU-2017:1287-1
- SUSE-SU-2017:1288-1
- SUSE-SU-2017:1289-1
- SUSE-SU-2017:1290-1
- SUSE-SU-2017:1291-1
- SUSE-SU-2017:1293-1
- SUSE-SU-2017:1294-1
- SUSE-SU-2017:1295-1
- SUSE-SU-2017:1297-1
- SUSE-SU-2017:1299-1
- SUSE-SU-2017:1300-1
- SUSE-SU-2017:1301-1
- SUSE-SU-2017:1302-1
- SUSE-SU-2017:1303-1
- SUSE-SU-2017:1308-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1853-1
- SUSE-SU-2017:1990-1
- SUSE-SU-2017:2043-1
- SUSE-SU-2017:2046-1
- SUSE-SU-2017:2062-1
- SUSE-SU-2017:2063-1
- SUSE-SU-2017:2064-1
- SUSE-SU-2017:2065-1
- SUSE-SU-2017:2066-1
- SUSE-SU-2017:2067-1
- SUSE-SU-2017:2068-1
- SUSE-SU-2017:2070-1
- SUSE-SU-2017:2286-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2389-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2694-1
- SUSE-SU-2017:2847-1
- SUSE-SU-2017:2869-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2017:2956-1
- SUSE-SU-2017:3165-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2017:3267-1
- SUSE-SU-2017:3286-1
- SUSE-SU-2017:3287-1
- SUSE-SU-2017:3288-1
- SUSE-SU-2017:3289-1
- SUSE-SU-2017:3290-1
- SUSE-SU-2017:3291-1
- SUSE-SU-2017:3292-1
- SUSE-SU-2017:3293-1
- SUSE-SU-2017:3296-1
- SUSE-SU-2017:3299-1
- SUSE-SU-2017:3301-1
- SUSE-SU-2017:3302-1
- SUSE-SU-2017:3303-1
- SUSE-SU-2017:3304-1
- SUSE-SU-2017:3305-1
- SUSE-SU-2017:3306-1
- SUSE-SU-2017:3308-1
- SUSE-SU-2017:3309-1
- SUSE-SU-2017:3310-1
- SUSE-SU-2017:3312-1
- SUSE-SU-2017:3313-1
- SUSE-SU-2017:3316-1
- SUSE-SU-2017:3318-1
- SUSE-SU-2017:3320-1
- SUSE-SU-2017:3321-1
- SUSE-SU-2017:3322-1
- SUSE-SU-2017:3323-1
- SUSE-SU-2017:3332-1
- SUSE-SU-2017:3336-1
- SUSE-SU-2017:3337-1
- SUSE-SU-2017:3340-1
- USN-3256-1
- USN-3256-2
- USN-3342-1
- USN-3342-2
- USN-3343-1
- USN-3343-2
- USN-3344-1
- USN-3344-2
- USN-3345-1
- USN-3358-1
- USN-3359-1
- USN-3360-1
- USN-3360-2
- USN-3364-1
- USN-3364-2
- USN-3364-3
- USN-3371-1
- USN-3420-1
- USN-3420-2
- USN-3422-1
- USN-3422-2
- USN-3469-1
- USN-3469-2
- USN-3470-1
- USN-3470-2
- USN-3487-1
- USN-3583-1
- USN-3583-2
- USN-3754-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2017-3637 | http://linux.oracle.com/errata/ELSA-2017-3637.html | |
CVE | CVE-2017-14489 | http://linux.oracle.com/cve/CVE-2017-14489.html | |
CVE | CVE-2016-10044 | http://linux.oracle.com/cve/CVE-2016-10044.html | |
CVE | CVE-2017-11473 | http://linux.oracle.com/cve/CVE-2017-11473.html | |
CVE | CVE-2017-8831 | http://linux.oracle.com/cve/CVE-2017-8831.html | |
CVE | CVE-2017-10661 | http://linux.oracle.com/cve/CVE-2017-10661.html | |
CVE | CVE-2017-7308 | http://linux.oracle.com/cve/CVE-2017-7308.html | |
CVE | CVE-2017-1000363 | http://linux.oracle.com/cve/CVE-2017-1000363.html | |
CVE | CVE-2017-1000380 | http://linux.oracle.com/cve/CVE-2017-1000380.html | |
CVE | CVE-2017-9077 | http://linux.oracle.com/cve/CVE-2017-9077.html | |
CVE | CVE-2017-9074 | http://linux.oracle.com/cve/CVE-2017-9074.html | |
CVE | CVE-2017-9075 | http://linux.oracle.com/cve/CVE-2017-9075.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.39-400.297.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.39-400.297.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.297.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.39-400.297.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.39-400.297.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.39-400.297.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.39-400.297.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.39-400.297.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.39-400.297.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.39-400.297.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.297.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.39-400.297.12.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |