ELSA-2017-3636

ELSA-2017-3636 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-11-02

Description


kernel-uek
[3.8.13-118.19.12]
- nvme: Drop nvmeq->q_lock before dma_pool_alloc(), so as to prevent hard lockups (Aruna Ramakrishna) [Orabug: 25409587]

[3.8.13-118.19.11]
- nvme: Handle PM1725 HIL reset (Martin K. Petersen) [Orabug: 26277600]
- char: lp: fix possible integer overflow in lp_setup() (Willy Tarreau) [Orabug: 26403940] {CVE-2017-1000363}
- ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT (Takashi Iwai) [Orabug: 26403956] {CVE-2017-1000380}
- ALSA: timer: Fix race between read and ioctl (Takashi Iwai) [Orabug: 26403956] {CVE-2017-1000380}
- ALSA: timer: fix NULL pointer dereference in read()/ioctl() race (Vegard Nossum) [Orabug: 26403956] {CVE-2017-1000380}
- ALSA: timer: Fix negative queue usage by racy accesses (Takashi Iwai) [Orabug: 26403956] {CVE-2017-1000380}
- ALSA: timer: Fix race at concurrent reads (Takashi Iwai) [Orabug: 26403956] {CVE-2017-1000380}
- ALSA: timer: Fix race among timer ioctls (Takashi Iwai) [Orabug: 26403956] {CVE-2017-1000380}
- ipv6/dccp: do not inherit ipv6_mc_list from parent (WANG Cong) [Orabug: 26404005] {CVE-2017-9077}
- ocfs2: fix deadlock issue when taking inode lock at vfs entry points (Eric Ren) [Orabug: 26427126]
- ocfs2/dlmglue: prepare tracking logic to avoid recursive cluster lock (Eric Ren) [Orabug: 26427126]
- ping: implement proper locking (Eric Dumazet) [Orabug: 26540286] {CVE-2017-2671}
- aio: mark AIO pseudo-fs noexec (Jann Horn) [Orabug: 26643598] {CVE-2016-10044}
- vfs: Commit to never having exectuables on proc and sysfs. (Eric W. Biederman) [Orabug: 26643598] {CVE-2016-10044}
- vfs, writeback: replace FS_CGROUP_WRITEBACK with SB_I_CGROUPWB (Tejun Heo) [Orabug: 26643598] {CVE-2016-10044}
- x86/acpi: Prevent out of bound access caused by broken ACPI tables (Seunghun Han) [Orabug: 26643645] {CVE-2017-11473}
- sctp: do not inherit ipv6_{mc|ac|fl}_list from parent (Eric Dumazet) [Orabug: 26650883] {CVE-2017-9075}
- [media] saa7164: fix double fetch PCIe access condition (Steven Toth) [Orabug: 26675142] {CVE-2017-8831}
- [media] saa7164: fix sparse warnings (Hans Verkuil) [Orabug: 26675142] {CVE-2017-8831}
- fs: __generic_file_splice_read retry lookup on AOP_TRUNCATED_PAGE (Abhi Das) [Orabug: 26797306]
- timerfd: Protect the might cancel mechanism proper (Thomas Gleixner) [Orabug: 26899787] {CVE-2017-10661}
- scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly (Xin Long) [Orabug: 26988627] {CVE-2017-14489}


Related CVEs


CVE-2017-1000380
CVE-2017-11473
CVE-2017-1000363
CVE-2017-9077
CVE-2017-2671
CVE-2017-8831
CVE-2016-10044
CVE-2017-10661
CVE-2017-9075
CVE-2017-14489

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) dtrace-modules-3.8.13-118.19.12.el6uek-0.4.5-3.el6.src.rpm4d56decbc90232a8841733d4bd9da2225da46652b507343f2f9d6354a3fa9e2c-ol6_x86_64_UEKR3_latest
kernel-uek-3.8.13-118.19.12.el6uek.src.rpmb1997b85a2474c07b942cd57a68eaf12441ad86043a24eb464d1a39b99ca72bdELSA-2025-20007ol6_x86_64_UEKR3_latest
dtrace-modules-3.8.13-118.19.12.el6uek-0.4.5-3.el6.x86_64.rpmdfa1bc55099d388dfd026e2063459fa6efe9e6d4439f6c3cd364ab8e349b5559-ol6_x86_64_UEKR3_latest
kernel-uek-3.8.13-118.19.12.el6uek.x86_64.rpm8ce66ec58825adb2128e898d3e2a708cca95dccdba64f9d7c47e20d3a401df72ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-debug-3.8.13-118.19.12.el6uek.x86_64.rpme2200fd440fa54afc746c70df641ccd128af17445de2db878821d164ca86c403ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-debug-devel-3.8.13-118.19.12.el6uek.x86_64.rpm8d472001142734ddb7e0bd09b1469f7081eb56a4d26d0725f164a62796f6e173ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-devel-3.8.13-118.19.12.el6uek.x86_64.rpmf7fa31d95ca0e63d90a4dd6a2af439fac7f3f36ceed3177ca723c00d438b0fdbELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-doc-3.8.13-118.19.12.el6uek.noarch.rpm893e140f5caed62ba44333585dacfee6f15b35c0ff6e807c6fecb735e9339ab9ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-firmware-3.8.13-118.19.12.el6uek.noarch.rpm86ac9fcf13234ad8d191140d350de262cdcbaa71ae5e6663f835e97eb8c7afc8ELSA-2025-20007ol6_x86_64_UEKR3_latest
Oracle Linux 7 (x86_64) dtrace-modules-3.8.13-118.19.12.el7uek-0.4.5-3.el7.src.rpmf0feb0a722dbe7243965bd68d947dc602ae872e02f295032ced9eadb937297e7-ol7_x86_64_UEKR3
kernel-uek-3.8.13-118.19.12.el7uek.src.rpm97c03bfe3189c0be0a541de701ae722907d987fb1408cec3270a074fec5d83bdELSA-2025-20190ol7_x86_64_UEKR3
dtrace-modules-3.8.13-118.19.12.el7uek-0.4.5-3.el7.x86_64.rpm58e2dc3e2be3ffc36a55affbd9dd0397760ab161083dacff5cc44bcaaadd9020-ol7_x86_64_UEKR3
kernel-uek-3.8.13-118.19.12.el7uek.x86_64.rpmd7eb779310552beb89afacd191b2f7d57a316fdab10d483b59982e1e23942dd9ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-debug-3.8.13-118.19.12.el7uek.x86_64.rpm5931ca3e51c7d6e49941307a1922288483734bb280fddc65a1873c993d822c5cELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-debug-devel-3.8.13-118.19.12.el7uek.x86_64.rpm25ee14fba442659793e8fe432ba1d2aac808deeb832be77872f220e351c53cd1ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-devel-3.8.13-118.19.12.el7uek.x86_64.rpmc2fe4475aef6ad8f548ccf3e5cf7afd6ade3fffa3a12be2057abecf77e0eb3c5ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-doc-3.8.13-118.19.12.el7uek.noarch.rpm41ce263ecaa6867bd60f55b1416e7507fc113641862abd6d65a09149e039ca4aELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-firmware-3.8.13-118.19.12.el7uek.noarch.rpme8b03a96d167d0fb6076c6620650020c3176951ea47faaac5ed09d4a9ec3eac4ELSA-2025-20007ol7_x86_64_UEKR3



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete