ELSA-2017-1842-1

ELSA-2017-1842-1 - kernel security, bug fix, and enhancement update

Type:SECURITY
Severity:IMPORTANT
Release Date:2017-08-15

Description



Related CVEs


CVE-2014-7975
CVE-2016-9576
CVE-2016-10088
CVE-2016-7097
CVE-2016-7042
CVE-2016-9806
CVE-2017-7187
CVE-2016-10147
CVE-2016-9588
CVE-2017-2596
CVE-2016-8645
CVE-2017-5970
CVE-2017-6001
CVE-2017-2647
CVE-2017-8890
CVE-2017-9077
CVE-2014-7970
CVE-2015-8970
CVE-2016-10200
CVE-2016-6213
CVE-2016-9604
CVE-2017-2671
CVE-2017-6951
CVE-2017-7616
CVE-2017-7889
CVE-2017-9074
CVE-2017-9076
CVE-2017-9242
CVE-2015-8839
CVE-2016-9685
CVE-2017-8797
CVE-2017-9075

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (x86_64) kernel-3.10.0-693.0.0.0.1.el7.src.rpme8242af4316fb158d6a20ecf6d0ce679ELSA-2017-2473-1
kernel-3.10.0-693.0.0.0.1.el7.x86_64.rpmdb607fd897d3afb3bbb01d4acd9024c1ELSA-2017-2473-1
kernel-abi-whitelists-3.10.0-693.0.0.0.1.el7.noarch.rpm3525e23fa2d19bc61923c163b4ab2f55ELSA-2017-2473-1
kernel-debug-3.10.0-693.0.0.0.1.el7.x86_64.rpm7ff4d45be3a675c8b70c991e53f4b351ELSA-2017-2473-1
kernel-debug-devel-3.10.0-693.0.0.0.1.el7.x86_64.rpmb37f3dcebc00a4d7e17a3ee56e51b934ELSA-2017-2473-1
kernel-devel-3.10.0-693.0.0.0.1.el7.x86_64.rpm959de656bed172ceab6eeabbeea54002ELSA-2017-2473-1
kernel-doc-3.10.0-693.0.0.0.1.el7.noarch.rpmfa67e94899892829621dc35d113f7785ELSA-2017-2473-1
kernel-headers-3.10.0-693.0.0.0.1.el7.x86_64.rpm8eed494c590cdd6518ce877112e6c475ELSA-2017-2473-1
kernel-tools-3.10.0-693.0.0.0.1.el7.x86_64.rpmfd76638a0e52e87dbdd172f936eedbaeELSA-2017-2473-1
kernel-tools-libs-3.10.0-693.0.0.0.1.el7.x86_64.rpma6c3799c816545d164caed4a056558cbELSA-2017-2473-1
kernel-tools-libs-devel-3.10.0-693.0.0.0.1.el7.x86_64.rpmc21b1b7c3ca2f58a62622490fadefadbELSA-2017-2473-1
perf-3.10.0-693.0.0.0.1.el7.x86_64.rpm52dbd0d5dc5d88123d6b3a7d8c2ba27aELSA-2017-2473-1
python-perf-3.10.0-693.0.0.0.1.el7.x86_64.rpm7f66e7210c49b613342594c4534799b9ELSA-2017-2473-1



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete