ELSA-2017-3539

ELSA-2017-3539 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2017-04-13

Description


kernel-uek
[4.1.12-61.1.34]
- uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug: 25698171]
- ksplice: add sysctls for determining Ksplice features. (Jamie Iles) [Orabug: 25698171]
- signal: protect SIGNAL_UNKILLABLE from unintentional clearing. (Jamie Iles) [Orabug: 25698171]
- KVM: x86: fix emulation of 'MOV SS, null selector' (Paolo Bonzini) [Orabug: 25719659] {CVE-2017-2583} {CVE-2017-2583}
- ext4: store checksum seed in superblock (Darrick J. Wong) [Orabug: 25719728] {CVE-2016-10208}
- ext4: reserve code points for the project quota feature (Theodore Ts'o) [Orabug: 25719728] {CVE-2016-10208}
- ext4: validate s_first_meta_bg at mount time (Eryu Guan) [Orabug: 25719728] {CVE-2016-10208}
- ext4: clean up feature test macros with predicate functions (Darrick J. Wong) [Orabug: 25719728] {CVE-2016-10208}
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo Ricardo Leitner) [Orabug: 25719793] {CVE-2017-5986}
- tcp: avoid infinite loop in tcp_splice_read() (Eric Dumazet) [Orabug: 25720805] {CVE-2017-6214}
- ip: fix IP_CHECKSUM handling (Paolo Abeni) [Orabug: 25720839] {CVE-2017-6347}
- udp: fix IP_CHECKSUM handling (Eric Dumazet) [Orabug: 25720839] {CVE-2017-6347}
- udp: do not expect udp headers in recv cmsg IP_CMSG_CHECKSUM (Willem de Bruijn) [Orabug: 25720839] {CVE-2017-6347}
- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder (Andy Whitcroft) [Orabug: 25814641] {CVE-2017-7184}
- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window (Andy Whitcroft) [Orabug: 25814641] {CVE-2017-7184}
- block: fix use-after-free in seq file (Vegard Nossum) [Orabug: 25877509] {CVE-2016-7910}


Related CVEs


CVE-2016-7910
CVE-2017-2583
CVE-2017-6214
CVE-2017-6347
CVE-2017-7184
CVE-2016-10208
CVE-2017-5986

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) dtrace-modules-4.1.12-61.1.34.el6uek-0.5.3-2.el6.src.rpmbe91e032c60911d672e198c901d3c77c-
kernel-uek-4.1.12-61.1.34.el6uek.src.rpm62b4910631230de7a8c1b23c7bb0ad91ELSA-2021-9215
dtrace-modules-4.1.12-61.1.34.el6uek-0.5.3-2.el6.x86_64.rpmb8f876e269a5271701052efb7ae5d790-
kernel-uek-4.1.12-61.1.34.el6uek.x86_64.rpm8e99220bb85ed0340123d473398709c0ELSA-2021-9215
kernel-uek-debug-4.1.12-61.1.34.el6uek.x86_64.rpm2f0431b999e11034f5ffa1c4aaee72cbELSA-2021-9215
kernel-uek-debug-devel-4.1.12-61.1.34.el6uek.x86_64.rpmac15109fa2bc6d732a57847a17beab84ELSA-2021-9215
kernel-uek-devel-4.1.12-61.1.34.el6uek.x86_64.rpm624c4900ebf01bc47ad70d0910de29e2ELSA-2021-9215
kernel-uek-doc-4.1.12-61.1.34.el6uek.noarch.rpm401ee6b64d7f7e09d753e5a187e1a1b3ELSA-2021-9215
kernel-uek-firmware-4.1.12-61.1.34.el6uek.noarch.rpm5f3d07a4a97f9f8266bc4c5d8ca5d478ELSA-2021-9215
Oracle Linux 7 (x86_64) dtrace-modules-4.1.12-61.1.34.el7uek-0.5.3-2.el7.src.rpm8f074a67ac2acf577a80fce880f79c56-
kernel-uek-4.1.12-61.1.34.el7uek.src.rpmf06399e8540e8030843e881ab6a83103ELSA-2021-9220
dtrace-modules-4.1.12-61.1.34.el7uek-0.5.3-2.el7.x86_64.rpm9e4f44f3c1ba66c5e114ad58ccfab7fb-
kernel-uek-4.1.12-61.1.34.el7uek.x86_64.rpm412fb38f8c07eda690ff970dde7f7f41ELSA-2021-9220
kernel-uek-debug-4.1.12-61.1.34.el7uek.x86_64.rpmda68fd104b6590d98f6e44a72881aec5ELSA-2021-9220
kernel-uek-debug-devel-4.1.12-61.1.34.el7uek.x86_64.rpm1ad91a3c94edc53eb7b4f7d7324999aeELSA-2021-9220
kernel-uek-devel-4.1.12-61.1.34.el7uek.x86_64.rpm8da18ce1921c57321b3ef11438a36857ELSA-2021-9220
kernel-uek-doc-4.1.12-61.1.34.el7uek.noarch.rpmed711eca6f87f92043b43a5967fdb8f0ELSA-2021-9220
kernel-uek-firmware-4.1.12-61.1.34.el7uek.noarch.rpmab2d6570f91a5c5a1fb9a0a7c2256d1fELSA-2021-9215



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete