ELSA-2017-3651

ELSA-2017-3651 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-12-07

Description


[4.1.12-103.10.1]
- mm, thp: Do not make page table dirty unconditionally in follow_trans_huge_pmd() (Kirill A. Shutemov) [Orabug: 27200879] {CVE-2017-1000405}
- NFS: Add static NFS I/O tracepoints (Chuck Lever)
- storvsc: dont assume SG list is contiguous (Aruna Ramakrishna) [Orabug: 27044692]
- fix unbalanced page refcounting in bio_map_user_iov (Vitaly Mayatskikh) [Orabug: 27069038] {CVE-2017-12190}
- more bio_map_user_iov() leak fixes (Al Viro) [Orabug: 27069038] {CVE-2017-12190}
- packet: in packet_do_bind, test fanout with bind_lock held (Willem de Bruijn) [Orabug: 27069065] {CVE-2017-15649}
- packet: hold bind lock when rebinding to fanout hook (Willem de Bruijn) [Orabug: 27069065] {CVE-2017-15649}
- net: convert packet_fanout.sk_ref from atomic_t to refcount_t (Reshetova, Elena) [Orabug: 27069065] {CVE-2017-15649}
- packet: fix races in fanout_add() (Eric Dumazet) [Orabug: 27069065] {CVE-2017-15649}
- refcount_t: Introduce a special purpose refcount type (Peter Zijlstra) [Orabug: 27069065] {CVE-2017-15649}
- locking/atomics: Add _{acquire|release|relaxed}() variants of some atomic operations (Will Deacon) [Orabug: 27069065] {CVE-2017-15649}
- net: qmi_wwan: fix divide by 0 on bad descriptors (Bjorn Mork) [Orabug: 27215225] {CVE-2017-16650}
- ALSA: usb-audio: Kill stray URB at exiting (Takashi Iwai) [Orabug: 27148276] {CVE-2017-16527}
- scsi: Add STARGET_CREATED_REMOVE state to scsi_target_state (Ewan D. Milne) [Orabug: 27187217]
- ocfs2: fix posix_acl_create deadlock (Junxiao Bi) [Orabug: 27126129]
- scsi: Dont abort scsi_scan due to unexpected response (John Sobecki) [Orabug: 27119628]
- ocfs2: code clean up for direct io (Ryan Ding)
- xscore: add dma address check (Zhu Yanjun) [Orabug: 27076919]
- KVM: nVMX: Fix loss of L2s NMI blocking state (Wanpeng Li) [Orabug: 27062498]
- KVM: nVMX: track NMI blocking state separately for each VMCS (Paolo Bonzini) [Orabug: 27062498]
- KVM: VMX: require virtual NMI support (Paolo Bonzini) [Orabug: 27062498]
- KVM: nVMX: Fix the NMI IDT-vectoring handling (Wanpeng Li) [Orabug: 27062498]
- uek-rpm: disable CONFIG_NUMA_BALANCING_DEFAULT_ENABLED (Fred Herard) [Orabug: 26798697]
- thp: run vma_adjust_trans_huge() outside i_mmap_rwsem (Kirill A. Shutemov) [Orabug: 27026180]
- selinux: fix off-by-one in setprocattr (Stephen Smalley) [Orabug: 27001717] {CVE-2017-2618} {CVE-2017-2618} {CVE-2017-2618}
- sysctl: Drop reference added by grab_header in proc_sys_readdir (Zhou Chengming) [Orabug: 27036903] {CVE-2016-9191} {CVE-2016-9191} {CVE-2016-9191}
- KEYS: prevent KEYCTL_READ on negative key (Eric Biggers) [Orabug: 27050248] {CVE-2017-12192}
- IB/ipoib: For sendonly join free the multicast group on leave (Christoph Lameter) [Orabug: 27077718]
- IB/ipoib: increase the max mcast backlog queue (Doug Ledford) [Orabug: 27077718]
- IB/ipoib: Make sendonly multicast joins create the mcast group (Doug Ledford) [Orabug: 27077718]
- IB/ipoib: Expire sendonly multicast joins (Christoph Lameter) [Orabug: 27077718]
- IB/ipoib: Suppress warning for send only join failures (Jason Gunthorpe) [Orabug: 27077718]
- IB/ipoib: Clean up send-only multicast joins (Doug Ledford) [Orabug: 27077718]
- netlink: allow to listen 'all' netns (Nicolas Dichtel) [Orabug: 27077944]
- netlink: rename private flags and states (Nicolas Dichtel) [Orabug: 27077944]
- netns: use a spin_lock to protect nsid management (Nicolas Dichtel) [Orabug: 27077944]
- netns: notify new nsid outside __peernet2id() (Nicolas Dichtel) [Orabug: 27077944]
- netns: rename peernet2id() to peernet2id_alloc() (Nicolas Dichtel) [Orabug: 27077944]
- netns: always provide the id to rtnl_net_fill() (Nicolas Dichtel) [Orabug: 27077944]
- netns: returns always an id in __peernet2id() (Nicolas Dichtel) [Orabug: 27077944]
- Hang/soft lockup in d_invalidate with simultaneous calls (Al Viro) [Orabug: 27052681]
- Revert 'drivers/char/mem.c: deny access in open operation when securelevel is set' (Brian Maly) [Orabug: 27037811]


Related CVEs


CVE-2017-12190
CVE-2017-15649
CVE-2017-16650
CVE-2017-16527
CVE-2017-1000405

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-103.10.1.el6uek.src.rpmbf43dc0a77515be7c28a46e65e368dd71096d3ed4f4ae34db87b8566ce372304ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-4.1.12-103.10.1.el6uek.x86_64.rpmfd970e976828799214270f0e60b04b49c03f8318d9bd80b26da1e0e285751327ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-103.10.1.el6uek.x86_64.rpm3d2a715cc6b4b9dab6ca4ce0c4e62cea0c24b09ca7cc3335e3d0133afdc2f2c7ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-103.10.1.el6uek.x86_64.rpm993869f01c69576075fa95aa999848a74a5dfe73e7ccb5dfa2d3fd2413dacd45ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-103.10.1.el6uek.x86_64.rpm3ecb98e729b2705cd50dd83482521137a0f9ab79cf9605dbb53076ed9b294e3dELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-103.10.1.el6uek.noarch.rpm4a378b258432c1dcba9303ea8387ebb5f2097a994cd2163d21cab0d65a85b8e2ELSA-2025-20007ol6_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-103.10.1.el6uek.noarch.rpmfd0d89297828b6a8cd905a57a0f6b02803f7090a92ed849b7892a1a9404d63ecELSA-2025-20007ol6_x86_64_UEKR4_archive
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-103.10.1.el7uek.src.rpm63a7e45af2cf1994145ebcc254c69b57f4dc6226c3b043526e9ac1c400389c04ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-4.1.12-103.10.1.el7uek.x86_64.rpm51f76ab0a49d6718980e0783b9d9d9412727799cab81dbbbfb1490dd9f978038ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-4.1.12-103.10.1.el7uek.x86_64.rpm2b408ce284c452e3035a6462d9bfaa624829e5ec6b4b4463a882479335d05fc9ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-debug-devel-4.1.12-103.10.1.el7uek.x86_64.rpm9b690e47526ac03f23f1cdbc7c2fcbb97751d7fa4a125af77e20bb4200281fb3ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-devel-4.1.12-103.10.1.el7uek.x86_64.rpm2846f95236f5339143d266bea3df7dc90ff2232e7395893aa3f60d07901a3949ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-doc-4.1.12-103.10.1.el7uek.noarch.rpm99713fbf76b08210a87f0cd47d0fce93ac8e83b059f37b0a9fb34b52a8bcbb31ELSA-2025-20190ol7_x86_64_UEKR4_archive
kernel-uek-firmware-4.1.12-103.10.1.el7uek.noarch.rpm7c26bc8679d0934414ef7dffc9c66dc3a18cd6aa6f57dd1a12915c76e9259bb6ELSA-2025-20007ol7_x86_64_UEKR4_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete