ELSA-2017-3535

ELSA-2017-3535 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-03-31

Description


[2.6.39-400.294.6]
- RHEL: complement upstream workaround for CVE-2016-10142. (Quentin Casasnovas) [Orabug: 25765786] {CVE-2016-10142} {CVE-2016-10142}

[2.6.39-400.294.5]
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766914] {CVE-2016-8399}
- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765786] {CVE-2016-10142}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765448] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25752011] {CVE-2017-7187}

[2.6.39-400.294.4]
- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696689] {CVE-2017-2636}
- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696689] {CVE-2017-2636}
- drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696689] {CVE-2017-2636}
- list: introduce list_first_entry_or_null (Jiri Pirko) [Orabug: 25696689] {CVE-2017-2636}
- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451538] {CVE-2016-8633}
- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463929] {CVE-2016-3672}
- x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463929] {CVE-2016-3672}
- sg_start_req(): make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490377] {CVE-2015-5707}
- tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507232] {CVE-2016-8645}
- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507232] {CVE-2016-8645}
- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507330] {CVE-2016-7425}
- x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 25507375] {CVE-2015-4700}
- net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512417] {CVE-2016-4580}
- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512472] {CVE-2016-3140}
- net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682437] {CVE-2017-6345}


Related CVEs


CVE-2016-8633
CVE-2017-2636
CVE-2016-3672
CVE-2015-4700
CVE-2015-5707
CVE-2016-7425
CVE-2016-3140
CVE-2016-4580
CVE-2016-8399
CVE-2016-10088
CVE-2016-8645
CVE-2017-7187
CVE-2016-10142
CVE-2017-6345

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-uek-2.6.39-400.294.6.el5uek.src.rpm740a2f8dcde896b6d51c783369c718e35ad5f9922ed5381f977567659908ebfdELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-2.6.39-400.294.6.el5uek.i686.rpm5994b535d1f9770902b80ce92cf0f6a98b56c1c9e6043d8c01ca1c1d7afadc6dELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-debug-2.6.39-400.294.6.el5uek.i686.rpm4c304b51f90984ea2c29b382e96752985fefd9ead1ff1665779efce2c386cbe2ELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-debug-devel-2.6.39-400.294.6.el5uek.i686.rpm07cc4d3567f5950c0b218acc71a002a58e5d868a20ea6435059efb521a455cf3ELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-devel-2.6.39-400.294.6.el5uek.i686.rpm97f1af0d1d816d491ebcc98619cfe3f185166fdcf7eac94eba273db35de22148ELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-doc-2.6.39-400.294.6.el5uek.noarch.rpm9e7be64b273d1289ff9d48539b976ebf2a3133bd13a2862c70c8b420476b5af7ELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-firmware-2.6.39-400.294.6.el5uek.noarch.rpm76d87ba309ab92cec98d4b22f4e4e6e8923a999720c2405ba3bca7aab5973f28ELSA-2020-5936ol5_i386_UEK_latest
Oracle Linux 5 (x86_64) kernel-uek-2.6.39-400.294.6.el5uek.src.rpm740a2f8dcde896b6d51c783369c718e35ad5f9922ed5381f977567659908ebfdELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-2.6.39-400.294.6.el5uek.x86_64.rpm7dae8cff12ab191a1c5d702a46a905afc1a7612fc6c8d83d0ee87a347c48f79aELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-debug-2.6.39-400.294.6.el5uek.x86_64.rpme60b755168810fa59f523da3c502b8cf3533985f394d97eb132ef15afb7d8250ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-debug-devel-2.6.39-400.294.6.el5uek.x86_64.rpm0f007d4396834516ff25bbf8e03e341baa7e4fe90f041dd47268a94d48b0cc93ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-devel-2.6.39-400.294.6.el5uek.x86_64.rpma4b70406a429b4f190d71aa983112878fc52b3065087939abdfe2e947838f395ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-doc-2.6.39-400.294.6.el5uek.noarch.rpm9e7be64b273d1289ff9d48539b976ebf2a3133bd13a2862c70c8b420476b5af7ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-firmware-2.6.39-400.294.6.el5uek.noarch.rpm76d87ba309ab92cec98d4b22f4e4e6e8923a999720c2405ba3bca7aab5973f28ELSA-2020-5936ol5_x86_64_UEK_latest
Oracle Linux 6 (i386) kernel-uek-2.6.39-400.294.6.el6uek.src.rpm3656e4305de2922b6d425ddee7706f6a36e0128b1ab4742e744857cb9170857cELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-2.6.39-400.294.6.el6uek.i686.rpm5cac9ee81c5472c34b9677c3d20d3500fc1eff5a9f6e7fa4204ccf7c04cd9b1aELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-debug-2.6.39-400.294.6.el6uek.i686.rpm5874da6481be616fda1701baea8f7026e5ec75f62ecdfa633744e066d609a911ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-debug-devel-2.6.39-400.294.6.el6uek.i686.rpma3a02bde0e25c1bcbb2e105739a4c91f5baae3f0bfda6ab9e69eb97bc74219c2ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-devel-2.6.39-400.294.6.el6uek.i686.rpmba245784ccc81bef12753d3d6dd3ddbab89e21c2d74df44cba1da7e9705dc5e2ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-doc-2.6.39-400.294.6.el6uek.noarch.rpm0bbf5da3256af5ca402a621a9c7670e14a0cba618d41d27d35da117540925ac4ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-firmware-2.6.39-400.294.6.el6uek.noarch.rpm0919f5ad3153cd9952663efa964a31aea4248df8912af40db27d3330e09a300aELSA-2025-20007ol6_i386_UEK_latest
Oracle Linux 6 (x86_64) kernel-uek-2.6.39-400.294.6.el6uek.src.rpm3656e4305de2922b6d425ddee7706f6a36e0128b1ab4742e744857cb9170857cELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-2.6.39-400.294.6.el6uek.x86_64.rpmda7871c92b7c5e1424c6c4f3429d6e86ce78da1cca7c21605bc9dae269fbc4dcELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-debug-2.6.39-400.294.6.el6uek.x86_64.rpm35dd031501948c003aa73e4d941dc89d9586c513bd45244f56d2672f5df42bfeELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-debug-devel-2.6.39-400.294.6.el6uek.x86_64.rpmeacd0a1f3fbf8c877a805beb8a31c59c515aa811dca68c15611d583303b2c239ELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-devel-2.6.39-400.294.6.el6uek.x86_64.rpm95a492aa53d14cff779edb7043cd8559f9d5f00f3d8e56778ddd211e843eb056ELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-doc-2.6.39-400.294.6.el6uek.noarch.rpm0bbf5da3256af5ca402a621a9c7670e14a0cba618d41d27d35da117540925ac4ELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-firmware-2.6.39-400.294.6.el6uek.noarch.rpm0919f5ad3153cd9952663efa964a31aea4248df8912af40db27d3330e09a300aELSA-2025-20007ol6_x86_64_UEK_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete