ELSA-2017-3534

ELSA-2017-3534 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2017-03-31

Description


kernel-uek
[3.8.13-118.17.4]
- Revert 'fix minor infoleak in get_user_ex()' (Brian Maly) [Orabug: 25790392] {CVE-2016-9644}

[3.8.13-118.17.3]
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766911] {CVE-2016-8399}

[3.8.13-118.17.2]
- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765776] {CVE-2016-10142}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765445] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25751996] {CVE-2017-7187}

[3.8.13-118.17.1]
- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696686] {CVE-2017-2636}
- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696686] {CVE-2017-2636}
- drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696686] {CVE-2017-2636}
- x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 21305080] {CVE-2015-4700}
- net: filter: return -EINVAL if BPF_S_ANC* operation is not supported (Daniel Borkmann) [Orabug: 22187148]
- KEYS: request_key() should reget expired keys rather than give EKEYEXPIRED (David Howells)
- KEYS: Increase root_maxkeys and root_maxbytes sizes (Steve Dickson)
- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451530] {CVE-2016-8633}
- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463927] {CVE-2016-3672}
- x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463927] {CVE-2016-3672}
- pptp: verify sockaddr_len in pptp_bind() and pptp_connect() (WANG Cong) [Orabug: 25490335] {CVE-2015-8569}
- sg_start_req(): make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490372] {CVE-2015-5707}
- kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF) (Jim Mattson) [Orabug: 25507195] {CVE-2016-9588}
- tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507230] {CVE-2016-8645}
- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507230] {CVE-2016-8645}
- fix minor infoleak in get_user_ex() (Al Viro) [Orabug: 25507281] {CVE-2016-9178}
- scsi: arcmsr: Simplify user_len checking (Borislav Petkov) [Orabug: 25507328] {CVE-2016-7425}
- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507328] {CVE-2016-7425}
- net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512413] {CVE-2016-4580}
- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512471] {CVE-2016-3140}
- ipv4: keep skb->dst around in presence of IP options (Eric Dumazet) [Orabug: 25543892] {CVE-2017-5970}
- net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682430] {CVE-2017-6345}
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Andrey Konovalov) {CVE-2017-6074}
- crypto: algif_hash - Only export and import on sockets with data (Herbert Xu) [Orabug: 25417805] {CVE-2016-8646}
- USB: usbfs: fix potential infoleak in devio (Kangjie Lu) [Orabug: 25462760] {CVE-2016-4482}
- net: fix infoleak in llc (Kangjie Lu) [Orabug: 25462807] {CVE-2016-4485}
- af_unix: Guard against other == sk in unix_dgram_sendmsg (Rainer Weikusat) [Orabug: 25463996] {CVE-2013-7446}
- unix: avoid use-after-free in ep_remove_wait_queue (Rainer Weikusat) [Orabug: 25463996] {CVE-2013-7446}
- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet) [Orabug: 25203623] {CVE-2016-9793}


Related CVEs


CVE-2015-4700
CVE-2016-10088
CVE-2016-8399
CVE-2016-10142
CVE-2017-7187
CVE-2017-2636
CVE-2016-9588
CVE-2016-7425
CVE-2015-8569
CVE-2016-4580
CVE-2016-8633
CVE-2016-3672
CVE-2016-8645
CVE-2016-9178
CVE-2016-3140
CVE-2017-6345
CVE-2017-5970
CVE-2015-5707

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) dtrace-modules-3.8.13-118.17.4.el6uek-0.4.5-3.el6.src.rpmd3234d7d2ff5309b9361177d8a34e15a-
kernel-uek-3.8.13-118.17.4.el6uek.src.rpm89cfb6064ecd73deabe888c1bd74b04aELSA-2021-9215
dtrace-modules-3.8.13-118.17.4.el6uek-0.4.5-3.el6.x86_64.rpm813ef55072d01a7215807e62b52c5873-
kernel-uek-3.8.13-118.17.4.el6uek.x86_64.rpm69179a63cb7e679f2bdb901e01520646ELSA-2021-9215
kernel-uek-debug-3.8.13-118.17.4.el6uek.x86_64.rpm86b33500e7fa6ad3c1d46794728e0506ELSA-2021-9215
kernel-uek-debug-devel-3.8.13-118.17.4.el6uek.x86_64.rpma628d5611d6b9c07bd8a21317288a8a7ELSA-2021-9215
kernel-uek-devel-3.8.13-118.17.4.el6uek.x86_64.rpm98e8f9f39288f2633c31e8e506885272ELSA-2021-9215
kernel-uek-doc-3.8.13-118.17.4.el6uek.noarch.rpm98843553db671389d0d4ed043c070df7ELSA-2021-9215
kernel-uek-firmware-3.8.13-118.17.4.el6uek.noarch.rpm16022e41e1824f74bce1a56f2034d795ELSA-2021-9215
Oracle Linux 7 (x86_64) dtrace-modules-3.8.13-118.17.4.el7uek-0.4.5-3.el7.src.rpm029067ff068c1fe50cca7b89712dd473-
kernel-uek-3.8.13-118.17.4.el7uek.src.rpmd511eab84934ed421f34e136d2c1b092ELSA-2021-9220
dtrace-modules-3.8.13-118.17.4.el7uek-0.4.5-3.el7.x86_64.rpm134d3c2a2a400be5e2d312adf17119f3-
kernel-uek-3.8.13-118.17.4.el7uek.x86_64.rpm68442083896ed9cf0df20f113cd8c7b4ELSA-2021-9220
kernel-uek-debug-3.8.13-118.17.4.el7uek.x86_64.rpm677e5124b152181272cbd514bf6acde0ELSA-2021-9220
kernel-uek-debug-devel-3.8.13-118.17.4.el7uek.x86_64.rpm8e7a782b7ee9239e2217191a027e5c74ELSA-2021-9220
kernel-uek-devel-3.8.13-118.17.4.el7uek.x86_64.rpmbeee3194d761a5c8f948b4672e98e690ELSA-2021-9220
kernel-uek-doc-3.8.13-118.17.4.el7uek.noarch.rpm2eaf25859004aa9ae48bab8129e0b636ELSA-2021-9220
kernel-uek-firmware-3.8.13-118.17.4.el7uek.noarch.rpm6a40e803463b4b3523695b01ea63c81bELSA-2021-9215



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete