ELSA-2017-3567

ELSA-2017-3567 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-05-16

Description


[2.6.39-400.295.2]
- nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) [Orabug: 25986995] {CVE-2017-7895}

[2.6.39-400.295.1]
- ocfs2/o2net: o2net_listen_data_ready should do nothing if socket state is not TCP_LISTEN (Tariq Saeed) [Orabug: 25510857]
- IB/CORE: sync the resouce access in fmr_pool (Wengang Wang) [Orabug: 23750748]
- ipv6: Skip XFRM lookup if dst_entry in socket cache is valid (Jakub Sitnicki) [Orabug: 25534688]
- uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug: 25549845]
- ksplice: add sysctls for determining Ksplice features. (Jamie Iles) [Orabug: 25549845]
- signal: protect SIGNAL_UNKILLABLE from unintentional clearing. (Jamie Iles) [Orabug: 25549845]
- KVM: x86: fix emulation of 'MOV SS, null selector' (Paolo Bonzini) [Orabug: 25719676] {CVE-2017-2583} {CVE-2017-2583}
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo Ricardo Leitner) [Orabug: 25719811] {CVE-2017-5986}
- tcp: avoid infinite loop in tcp_splice_read() (Eric Dumazet) [Orabug: 25720815] {CVE-2017-6214}
- USB: visor: fix null-deref at probe (Johan Hovold) [Orabug: 25796604] {CVE-2016-2782}
- ipc/shm: Fix shmat mmap nil-page protection (Davidlohr Bueso) [Orabug: 25797014] {CVE-2017-5669}
- vhost: actually track log eventfd file (Marc-Andre Lureau) [Orabug: 25797056] {CVE-2015-6252}
- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder (Andy Whitcroft) [Orabug: 25814664] {CVE-2017-7184}
- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window (Andy Whitcroft) [Orabug: 25814664] {CVE-2017-7184}
- KEYS: Remove key_type::match in favour of overriding default by match_preparse (David Howells) [Orabug: 25823965] {CVE-2017-2647} {CVE-2017-2647}
- USB: whiteheat: fix potential null-deref at probe (Johan Hovold) [Orabug: 25825107] {CVE-2015-5257}
- RDS: fix race condition when sending a message on unbound socket (Quentin Casasnovas) [Orabug: 25871048] {CVE-2015-6937} {CVE-2015-6937}
- udf: Check path length when reading symlink (Jan Kara) [Orabug: 25871104] {CVE-2015-9731}
- udf: Treat symlink component of type 2 as / (Jan Kara) [Orabug: 25871104] {CVE-2015-9731}
- udp: properly support MSG_PEEK with truncated buffers (Eric Dumazet) [Orabug: 25874741] {CVE-2016-10229}
- block: fix use-after-free in seq file (Vegard Nossum) [Orabug: 25877531] {CVE-2016-7910}
- RHEL: complement upstream workaround for CVE-2016-10142. (Quentin Casasnovas) [Orabug: 25765786] {CVE-2016-10142} {CVE-2016-10142}
- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766914] {CVE-2016-8399}
- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765786] {CVE-2016-10142}
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765448] {CVE-2016-10088}
- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25752011] {CVE-2017-7187}
- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696689] {CVE-2017-2636}
- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696689] {CVE-2017-2636}
- drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696689] {CVE-2017-2636}
- list: introduce list_first_entry_or_null (Jiri Pirko) [Orabug: 25696689] {CVE-2017-2636}
- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451538] {CVE-2016-8633}
- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463929] {CVE-2016-3672}
- x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463929] {CVE-2016-3672}
- sg_start_req(): make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490377] {CVE-2015-5707}
- tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507232] {CVE-2016-8645}
- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507232] {CVE-2016-8645}
- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507330] {CVE-2016-7425}
- x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 25507375] {CVE-2015-4700}
- net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512417] {CVE-2016-4580}
- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512472] {CVE-2016-3140}
- net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682437] {CVE-2017-6345}
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Andrey Konovalov) [Orabug: 25598277] {CVE-2017-6074}
- vfs: read file_handle only once in handle_to_path (Sasha Levin) [Orabug: 25388709] {CVE-2015-1420}
- crypto: algif_hash - Only export and import on sockets with data (Herbert Xu) [Orabug: 25417807]
- USB: usbfs: fix potential infoleak in devio (Kangjie Lu) [Orabug: 25462763] {CVE-2016-4482}
- net: fix infoleak in llc (Kangjie Lu) [Orabug: 25462811] {CVE-2016-4485}
- af_unix: Guard against other == sk in unix_dgram_sendmsg (Rainer Weikusat) [Orabug: 25464000] {CVE-2013-7446}
- unix: avoid use-after-free in ep_remove_wait_queue (Rainer Weikusat) [Orabug: 25464000] {CVE-2013-7446}


Related CVEs


CVE-2017-7895
CVE-2016-2782
CVE-2015-6252
CVE-2017-2647
CVE-2015-5257
CVE-2015-9731
CVE-2017-5986
CVE-2017-2583
CVE-2017-6214
CVE-2017-7184
CVE-2017-5669
CVE-2015-6937

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-uek-2.6.39-400.295.2.el5uek.src.rpm5cdd1a2d8b337237b5aa41e4ed3250c56e2b7b706fdc457479d561864281ba0bELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-2.6.39-400.295.2.el5uek.i686.rpm6bb92a9bec51fbaf57dd5e53e499f5e547b279bd48feaca4f43e1ff0a20519e3ELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-debug-2.6.39-400.295.2.el5uek.i686.rpm61cdca467ea6123026150c3df6e4bb00b8c71980a86493d07a7bd9ff938a9e69ELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-debug-devel-2.6.39-400.295.2.el5uek.i686.rpmf9f38b5e4a697413f9359c3b182a0cc1ba33c3fa8d37c108f2e590c8116e60eaELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-devel-2.6.39-400.295.2.el5uek.i686.rpm7846261eed8574385be5e2d3aa5450aefc8e5ceed8db17c3983f57c492b5fe7eELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-doc-2.6.39-400.295.2.el5uek.noarch.rpm98d38b666e37f5b09a1652b8f7f7956d255c901bd5f36031bbec67ef75a1f1f2ELSA-2020-5936ol5_i386_UEK_latest
kernel-uek-firmware-2.6.39-400.295.2.el5uek.noarch.rpm9c18adfa7eb266f013144fcfe31a50395350b9b312279a97040da78301a3b4efELSA-2020-5936ol5_i386_UEK_latest
Oracle Linux 5 (x86_64) kernel-uek-2.6.39-400.295.2.el5uek.src.rpm5cdd1a2d8b337237b5aa41e4ed3250c56e2b7b706fdc457479d561864281ba0bELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-2.6.39-400.295.2.el5uek.x86_64.rpmd2e10469f6efaad74c6bc972e9886acb8fc46fc2c4543cddcd5c3617f94d3ccaELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-debug-2.6.39-400.295.2.el5uek.x86_64.rpmffc58be8d84c7591bb2bf371a1380f288a298bab7a678838615e2ae7e4dd9d26ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-debug-devel-2.6.39-400.295.2.el5uek.x86_64.rpmc64a65e8292aaa7ea77901445f89ad8eab16b3e41790ed342e5d8182fdc0e2e6ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-devel-2.6.39-400.295.2.el5uek.x86_64.rpm0693e54385cb006b00097465909c4c27c22635120f6da5b40766056d492db2f0ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-doc-2.6.39-400.295.2.el5uek.noarch.rpm98d38b666e37f5b09a1652b8f7f7956d255c901bd5f36031bbec67ef75a1f1f2ELSA-2020-5936ol5_x86_64_UEK_latest
kernel-uek-firmware-2.6.39-400.295.2.el5uek.noarch.rpm9c18adfa7eb266f013144fcfe31a50395350b9b312279a97040da78301a3b4efELSA-2020-5936ol5_x86_64_UEK_latest
Oracle Linux 6 (i386) kernel-uek-2.6.39-400.295.2.el6uek.src.rpm635674f7eb2881657ddf0e2f5251eefcf3b5cd8e4412d073f113d0ce56868445ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-2.6.39-400.295.2.el6uek.i686.rpm0d56154be37a0a64881b50dc46f9a908bb8f8a62035d992c886f716141c3694cELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-debug-2.6.39-400.295.2.el6uek.i686.rpm2cd8ce450b698dc9b17c739d561efcc2ed1d2bb3c79695dd3db6a2607f8b7b9fELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-debug-devel-2.6.39-400.295.2.el6uek.i686.rpm4aabf78688cd0ecf29abd5d53511b6751175c2c1a0eb7d0168d8cffc95d16931ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-devel-2.6.39-400.295.2.el6uek.i686.rpm75ee3045d2b1079f97ce81f9cfe728d7b02ce33bc91671a7f2df4e5bb650b539ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-doc-2.6.39-400.295.2.el6uek.noarch.rpm230c5f945c0c7020b0b8f54abf4283593752f2fd1e87edf3f658978c8cc39872ELSA-2025-20007ol6_i386_UEK_latest
kernel-uek-firmware-2.6.39-400.295.2.el6uek.noarch.rpm25af7457ebd79f504c7ce86b7ac5957b3db16aef223523d68a956f54978471e7ELSA-2025-20007ol6_i386_UEK_latest
Oracle Linux 6 (x86_64) kernel-uek-2.6.39-400.295.2.el6uek.src.rpm635674f7eb2881657ddf0e2f5251eefcf3b5cd8e4412d073f113d0ce56868445ELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-2.6.39-400.295.2.el6uek.x86_64.rpm89ab7cb58a97d115c149a8b8f07981f041dca1aa2b80e874b99d2967081a56f7ELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-debug-2.6.39-400.295.2.el6uek.x86_64.rpmbca7967bdc5db742fc5d572a349d882087f46094bcf1b752972a274fe2cc09b9ELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-debug-devel-2.6.39-400.295.2.el6uek.x86_64.rpm128dd2cf7b7f81c5c0561382bc5ca6877d64dbd5f56f91e18240e2db83c6e83fELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-devel-2.6.39-400.295.2.el6uek.x86_64.rpm3769d46e56385e29495acf8b21db4becfcd7354da28dfa57b98f16e3bc03252dELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-doc-2.6.39-400.295.2.el6uek.noarch.rpm230c5f945c0c7020b0b8f54abf4283593752f2fd1e87edf3f658978c8cc39872ELSA-2025-20007ol6_x86_64_UEK_latest
kernel-uek-firmware-2.6.39-400.295.2.el6uek.noarch.rpm25af7457ebd79f504c7ce86b7ac5957b3db16aef223523d68a956f54978471e7ELSA-2025-20007ol6_x86_64_UEK_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete