Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-02-26 |
kernel-uek
[3.8.13-118.20.3]
- gre: fix a possible skb leak (Eric Dumazet) [Orabug: 26403972] {CVE-2017-9074}
- ipv6: Fix leak in ipv6_gso_segment(). (David S. Miller) [Orabug: 26403972] {CVE-2017-9074}
- ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt() (Ben Hutchings) [Orabug: 26403972] {CVE-2017-9074}
- ipv6: Check ip6_find_1stfragopt() return value properly. (David S. Miller) [Orabug: 26403972] {CVE-2017-9074}
- ipv6: Prevent overrun when parsing v6 header options (Craig Gallek) [Orabug: 26403972] {CVE-2017-9074}
- tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0 (Wei Wang) [Orabug: 26813390] {CVE-2017-14106}
- rxrpc: Fix several cases where a padded len isn't checked in ticket decode (David Howells) [Orabug: 26880517] {CVE-2017-7482} {CVE-2017-7482}
- xen/mmu: Call xen_cleanhighmap() with 4MB aligned for page tables mapping (Zhenzhong Duan) [Orabug: 26883322]
- KVM: x86: fix deadlock in clock-in-progress request handling (Marcelo Tosatti) [Orabug: 27065995]
- ocfs2: fstrim: Fix start offset of first cluster group during fstrim (Ashish Samant) [Orabug: 27099835]
- USB: serial: console: fix use-after-free after failed setup (Johan Hovold) [Orabug: 27206837] {CVE-2017-16525}
- uwb: properly check kthread_run return value (Andrey Konovalov) [Orabug: 27206897] {CVE-2017-16526}
- ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor (Takashi Iwai) [Orabug: 27206928] {CVE-2017-16529}
- USB: fix out-of-bounds in usb_set_configuration (Greg Kroah-Hartman) [Orabug: 27207240] {CVE-2017-16531}
- USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor() (Alan Stern) [Orabug: 27207983] {CVE-2017-16535}
- dccp: CVE-2017-8824: use-after-free in DCCP code (Mohamed Ghannam) [Orabug: 27290301] {CVE-2017-8824}
CVE-2017-9074 |
CVE-2017-14106 |
CVE-2017-7482 |
CVE-2017-16525 |
CVE-2017-16529 |
CVE-2017-16535 |
CVE-2017-16526 |
CVE-2017-16531 |
CVE-2017-8824 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | dtrace-modules-3.8.13-118.20.3.el6uek-0.4.5-3.el6.src.rpm | 74f3f0c0e8e6a86fa37e8a3942325aa0 | - |
kernel-uek-3.8.13-118.20.3.el6uek.src.rpm | 020ee0e7a496d7cb7f7e2311eb0a976d | ELSA-2021-9215 | |
dtrace-modules-3.8.13-118.20.3.el6uek-0.4.5-3.el6.x86_64.rpm | 4cc61685944c22058922b294ea7aad50 | - | |
kernel-uek-3.8.13-118.20.3.el6uek.x86_64.rpm | b5e19ea270ba94290e1ed68a3e4e30fa | ELSA-2021-9215 | |
kernel-uek-debug-3.8.13-118.20.3.el6uek.x86_64.rpm | a08d5728047e940a0270d3c6854cc82c | ELSA-2021-9215 | |
kernel-uek-debug-devel-3.8.13-118.20.3.el6uek.x86_64.rpm | 475b941135a8b69ce481fc7c40f77098 | ELSA-2021-9215 | |
kernel-uek-devel-3.8.13-118.20.3.el6uek.x86_64.rpm | 04a278488a54ebf6d8b30b38130645a6 | ELSA-2021-9215 | |
kernel-uek-doc-3.8.13-118.20.3.el6uek.noarch.rpm | 300581c08f572813d266711e5d701168 | ELSA-2021-9215 | |
kernel-uek-firmware-3.8.13-118.20.3.el6uek.noarch.rpm | 3c5b76c50a0e79863f2161ca009af7a5 | ELSA-2021-9215 | |
Oracle Linux 7 (x86_64) | dtrace-modules-3.8.13-118.20.3.el7uek-0.4.5-3.el7.src.rpm | b56dba359d77e1e3ccd60c91405547ba | - |
kernel-uek-3.8.13-118.20.3.el7uek.src.rpm | fe5208e805d629a115c2c98e9ea77d29 | ELSA-2021-9220 | |
dtrace-modules-3.8.13-118.20.3.el7uek-0.4.5-3.el7.x86_64.rpm | 5f243eb50429e159449ad16a8d9983cd | - | |
kernel-uek-3.8.13-118.20.3.el7uek.x86_64.rpm | f9d047c3365208ee64a483021f5a1f8a | ELSA-2021-9220 | |
kernel-uek-debug-3.8.13-118.20.3.el7uek.x86_64.rpm | 5621800cee438d0887a5f82e1cb289ac | ELSA-2021-9220 | |
kernel-uek-debug-devel-3.8.13-118.20.3.el7uek.x86_64.rpm | db138351746bd9566947ef4441abe85a | ELSA-2021-9220 | |
kernel-uek-devel-3.8.13-118.20.3.el7uek.x86_64.rpm | 20ca8295fc2417b393a305e10294ab23 | ELSA-2021-9220 | |
kernel-uek-doc-3.8.13-118.20.3.el7uek.noarch.rpm | 8237497620109267df54df5fb006b5f1 | ELSA-2021-9220 | |
kernel-uek-firmware-3.8.13-118.20.3.el7uek.noarch.rpm | 6e42a5ff1fc27d17f0b78e0696243e60 | ELSA-2021-9215 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team