ELSA-2017-3535

ELSA-2017-3535 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2017-03-31

Description


[2.6.39-400.294.6]
- RHEL: complement upstream workaround for CVE-2016-10142. (Quentin Casasnovas) [Orabug: 25765786] {CVE-2016-10142} {CVE-2016-10142}

[2.6.39-400.294.5]
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766914] {CVE-2016-8399}
- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765786] {CVE-2016-10142}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765448] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25752011] {CVE-2017-7187}

[2.6.39-400.294.4]
- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696689] {CVE-2017-2636}
- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696689] {CVE-2017-2636}
- drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696689] {CVE-2017-2636}
- list: introduce list_first_entry_or_null (Jiri Pirko) [Orabug: 25696689] {CVE-2017-2636}
- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451538] {CVE-2016-8633}
- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463929] {CVE-2016-3672}
- x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463929] {CVE-2016-3672}
- sg_start_req(): make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490377] {CVE-2015-5707}
- tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507232] {CVE-2016-8645}
- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507232] {CVE-2016-8645}
- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507330] {CVE-2016-7425}
- x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 25507375] {CVE-2015-4700}
- net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512417] {CVE-2016-4580}
- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512472] {CVE-2016-3140}
- net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682437] {CVE-2017-6345}


Related CVEs


CVE-2015-4700
CVE-2016-10088
CVE-2016-8399
CVE-2016-10142
CVE-2017-7187
CVE-2017-2636
CVE-2016-7425
CVE-2016-4580
CVE-2016-8633
CVE-2016-3672
CVE-2016-8645
CVE-2016-3140
CVE-2017-6345
CVE-2015-5707

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-uek-2.6.39-400.294.6.el5uek.src.rpm17d39a916cdd9cc4424a67635719fcc1ELSA-2020-5936
kernel-uek-2.6.39-400.294.6.el5uek.i686.rpm4a200f311044fa4b6ac59cc0cf476fbdELSA-2020-5936
kernel-uek-debug-2.6.39-400.294.6.el5uek.i686.rpm150335cb6ebc8888da1598a7741ae6b6ELSA-2020-5936
kernel-uek-debug-devel-2.6.39-400.294.6.el5uek.i686.rpmed83d9d0b7f779555835412ed8448ac6ELSA-2020-5936
kernel-uek-devel-2.6.39-400.294.6.el5uek.i686.rpm95bd0b63e2b8e595fc04c17c647bcf29ELSA-2020-5936
kernel-uek-doc-2.6.39-400.294.6.el5uek.noarch.rpme34898b32f8d1c0a7ab9afed2f66258aELSA-2020-5936
kernel-uek-firmware-2.6.39-400.294.6.el5uek.noarch.rpm0e4ca45a4f25d361887352e727597eb9ELSA-2020-5936
Oracle Linux 5 (x86_64) kernel-uek-2.6.39-400.294.6.el5uek.src.rpm17d39a916cdd9cc4424a67635719fcc1ELSA-2020-5936
kernel-uek-2.6.39-400.294.6.el5uek.x86_64.rpm328dd0e43a75a81ef9a024446e1c39fcELSA-2020-5936
kernel-uek-debug-2.6.39-400.294.6.el5uek.x86_64.rpm13f687e00c2185a56ae9683e94afcb62ELSA-2020-5936
kernel-uek-debug-devel-2.6.39-400.294.6.el5uek.x86_64.rpm82b1b4fa50412e60f2970a8d08bd2048ELSA-2020-5936
kernel-uek-devel-2.6.39-400.294.6.el5uek.x86_64.rpmcc098ed26ecb49b1d9da859ef7430519ELSA-2020-5936
kernel-uek-doc-2.6.39-400.294.6.el5uek.noarch.rpme34898b32f8d1c0a7ab9afed2f66258aELSA-2020-5936
kernel-uek-firmware-2.6.39-400.294.6.el5uek.noarch.rpm0e4ca45a4f25d361887352e727597eb9ELSA-2020-5936
Oracle Linux 6 (i386) kernel-uek-2.6.39-400.294.6.el6uek.src.rpm00f86f077e46f783e779d0e4706e1325ELSA-2021-9215
kernel-uek-2.6.39-400.294.6.el6uek.i686.rpm65bbe6f094dbf38cb629448c1928190aELSA-2021-9215
kernel-uek-debug-2.6.39-400.294.6.el6uek.i686.rpm27285041822ba95c4d6372b3eceee4fbELSA-2021-9215
kernel-uek-debug-devel-2.6.39-400.294.6.el6uek.i686.rpmcb50b440a67159636ae60348a45df5d6ELSA-2021-9215
kernel-uek-devel-2.6.39-400.294.6.el6uek.i686.rpm726e61982ebc9e4cf372539e828d4f14ELSA-2021-9215
kernel-uek-doc-2.6.39-400.294.6.el6uek.noarch.rpma58beeacf47c045efa7242289f5ae788ELSA-2021-9215
kernel-uek-firmware-2.6.39-400.294.6.el6uek.noarch.rpme949c8da36ecbf55827d9c84c7f975cdELSA-2021-9215
Oracle Linux 6 (x86_64) kernel-uek-2.6.39-400.294.6.el6uek.src.rpm00f86f077e46f783e779d0e4706e1325ELSA-2021-9215
kernel-uek-2.6.39-400.294.6.el6uek.x86_64.rpmaec06e7f9b5002f91eb9b20ba7942646ELSA-2021-9215
kernel-uek-debug-2.6.39-400.294.6.el6uek.x86_64.rpm8e0d7f510dd1122902d44babe8ce58acELSA-2021-9215
kernel-uek-debug-devel-2.6.39-400.294.6.el6uek.x86_64.rpm252d8e770a6a116d45d3d8c8c7b054f1ELSA-2021-9215
kernel-uek-devel-2.6.39-400.294.6.el6uek.x86_64.rpmd81a0855867e86b1c57ca5c9df734b0fELSA-2021-9215
kernel-uek-doc-2.6.39-400.294.6.el6uek.noarch.rpma58beeacf47c045efa7242289f5ae788ELSA-2021-9215
kernel-uek-firmware-2.6.39-400.294.6.el6uek.noarch.rpme949c8da36ecbf55827d9c84c7f975cdELSA-2021-9215



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete