ELSA-2019-4317

ELSA-2019-4317 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2019-01-04

Description


[2.6.39-400.305.1]
- ipv6: tcp: add rcu locking in tcp_v6_send_synack() (Eric Dumazet) [Orabug: 25059185] {CVE-2016-3841}
- ipv6: add complete rcu protection around np->opt (Eric Dumazet) [Orabug: 25059185] {CVE-2016-3841}
- scsi: qla2xxx: Fix an integer overflow in sysfs code (Dan Carpenter) [Orabug: 28220492] {CVE-2017-14051}
- ext4: fail ext4_iget for root directory if unallocated (Theodore Ts'o) [Orabug: 28220543] {CVE-2018-1092} {CVE-2018-1092}
- ALSA: seq: Fix regression by incorrect ioctl_mutex usages (Takashi Iwai) [Orabug: 29005191] {CVE-2018-1000004}
- netfilter: xt_osf: Add missing permission checks (Kevin Cernekee) [Orabug: 29037833] {CVE-2017-17450}
- HID: debug: check length before copy_to_user() (Daniel Rosenberg) [Orabug: 29128174] {CVE-2018-9516}
- Input: i8042 - fix crash at boot time (Chen Hong) [Orabug: 29152330] {CVE-2017-18079}


Related CVEs


CVE-2016-3841
CVE-2018-1000004
CVE-2018-1092
CVE-2017-18079
CVE-2017-14051
CVE-2017-17450
CVE-2018-9516

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-uek-2.6.39-400.305.1.el5uek.src.rpm119a4c8b43ad99c017d00490ec092d79-
kernel-uek-2.6.39-400.305.1.el5uek.i686.rpm5662172e7291c320047db0ee35cc5f15-
kernel-uek-debug-2.6.39-400.305.1.el5uek.i686.rpme2e032708f216135a98f8aee60194814-
kernel-uek-debug-devel-2.6.39-400.305.1.el5uek.i686.rpm313a2d529d50607dc7202f99b53ff805-
kernel-uek-devel-2.6.39-400.305.1.el5uek.i686.rpmfe8aa87b4ae29a6a047997b58129a5c2-
kernel-uek-doc-2.6.39-400.305.1.el5uek.noarch.rpm8d3dd27f17f7c8d19f0804f90f5dc0cb-
kernel-uek-firmware-2.6.39-400.305.1.el5uek.noarch.rpm29eb9e856756baabff4311425dd9e5ea-
Oracle Linux 5 (x86_64) kernel-uek-2.6.39-400.305.1.el5uek.src.rpm119a4c8b43ad99c017d00490ec092d79-
kernel-uek-2.6.39-400.305.1.el5uek.x86_64.rpm3daf85a372467e7cd11b8614d10a692e-
kernel-uek-debug-2.6.39-400.305.1.el5uek.x86_64.rpm98bf16e64a8121d551180b7bb409277f-
kernel-uek-debug-devel-2.6.39-400.305.1.el5uek.x86_64.rpm4779d50d42bf46723e1838c6e9379deb-
kernel-uek-devel-2.6.39-400.305.1.el5uek.x86_64.rpm3d171990408eb01943dbea2727a7a000-
kernel-uek-doc-2.6.39-400.305.1.el5uek.noarch.rpm8d3dd27f17f7c8d19f0804f90f5dc0cb-
kernel-uek-firmware-2.6.39-400.305.1.el5uek.noarch.rpm29eb9e856756baabff4311425dd9e5ea-
Oracle Linux 6 (i386) kernel-uek-2.6.39-400.305.1.el6uek.src.rpm9056a5c27f5ddb205726c7b9be6ce1e6-
kernel-uek-2.6.39-400.305.1.el6uek.i686.rpm6c2cf49138bd5b84431095e862e0d67a-
kernel-uek-debug-2.6.39-400.305.1.el6uek.i686.rpm3a3fb431c4e06774ab1380c2f87b4b41-
kernel-uek-debug-devel-2.6.39-400.305.1.el6uek.i686.rpma8f31e672ad919887b812118cb277223-
kernel-uek-devel-2.6.39-400.305.1.el6uek.i686.rpmd12b9f2b87864198668fee516ff1eece-
kernel-uek-doc-2.6.39-400.305.1.el6uek.noarch.rpm21770e700f6282d2b047c93332fb5224-
kernel-uek-firmware-2.6.39-400.305.1.el6uek.noarch.rpm32dd954510d07592b9e0e923b2ea673a-
Oracle Linux 6 (x86_64) kernel-uek-2.6.39-400.305.1.el6uek.src.rpm9056a5c27f5ddb205726c7b9be6ce1e6-
kernel-uek-2.6.39-400.305.1.el6uek.x86_64.rpm7e417d6662ce0e7adb9fc94e4fb0166f-
kernel-uek-debug-2.6.39-400.305.1.el6uek.x86_64.rpm17726f853d8024c893a14b7ba554f8b5-
kernel-uek-debug-devel-2.6.39-400.305.1.el6uek.x86_64.rpmbff4933d784f2b831b3f59a1796b1d32-
kernel-uek-devel-2.6.39-400.305.1.el6uek.x86_64.rpm2fb2ce064a1a1950a6606129d0ca1912-
kernel-uek-doc-2.6.39-400.305.1.el6uek.noarch.rpm21770e700f6282d2b047c93332fb5224-
kernel-uek-firmware-2.6.39-400.305.1.el6uek.noarch.rpm32dd954510d07592b9e0e923b2ea673a-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete