Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-0307

Опубликовано: 23 фев. 2017
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2017-0307: kernel security and bug fix update (MODERATE)

[2.6.32-642.15.1]

  • [net] dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Hannes Frederic Sowa) [1424626 1424628] {CVE-2017-6074}

[2.6.32-642.14.1]

  • [net] sctp: validate chunk len before actually using it (Hangbin Liu) [1399456 1399457] {CVE-2016-9555}
  • [netdrv] qlcnic: add wmb() call in transmit data path (Harish Patil) [1403143 1342659]
  • [kernel] audit: fix a double fetch in audit_log_single_execve_arg() (Paul Moore) [1359302 1359304] {CVE-2016-6136}
  • [fs] nfs: Kill fscache warnings when mounting without -ofsc (David Howells) [1399172 1353844]
  • [fs] nfs: Fix a compile issue when CONFIG_NFS_FSCACHE was undefined (David Howells) [1399172 1353844]
  • [fs] nfs: Don't pass mount data to nfs_fscache_get_super_cookie() (David Howells) [1399172 1353844]
  • [fs] nfsd: handle fileid wraparound (Dave Wysochanski) [1399174 1397552]
  • [scsi] hpsa: correct logical resets (Joseph Szczypek) [1399175 1083110]
  • [scsi] hpsa: generate a controller NMI (Joseph Szczypek) [1399175 1083110]
  • [scsi] hpsa: update driver version to 3.4.10-0-RH3 (Joseph Szczypek) [1399175 1083110]
  • [scsi] hpsa: Check for null devices in ioaccel submission patch (Joseph Szczypek) [1399175 1083110]
  • [scsi] hpsa: check for null device pointers (Joseph Szczypek) [1399175 1083110]
  • [scsi] hpsa: correct skipping masked peripherals (Joseph Szczypek) [1399175 1083110]
  • [scsi] hpsa: generalize external arrays (Joseph Szczypek) [1399175 1083110]
  • [fs] ext4: fix extent tree corruption caused by hole punch (Lukas Czerner) [1397808 1351798]
  • [hv] do not lose pending heartbeat vmbus packets (Vitaly Kuznetsov) [1397739 1378614]
  • [powerpc] ppc64: Fix incorrect return value from __copy_tofrom_user (Gustavo Duarte) [1398185 1387243]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel

2.6.32-642.15.1.el6

kernel-abi-whitelists

2.6.32-642.15.1.el6

kernel-debug

2.6.32-642.15.1.el6

kernel-debug-devel

2.6.32-642.15.1.el6

kernel-devel

2.6.32-642.15.1.el6

kernel-doc

2.6.32-642.15.1.el6

kernel-firmware

2.6.32-642.15.1.el6

kernel-headers

2.6.32-642.15.1.el6

perf

2.6.32-642.15.1.el6

python-perf

2.6.32-642.15.1.el6

Oracle Linux i686

kernel

2.6.32-642.15.1.el6

kernel-abi-whitelists

2.6.32-642.15.1.el6

kernel-debug

2.6.32-642.15.1.el6

kernel-debug-devel

2.6.32-642.15.1.el6

kernel-devel

2.6.32-642.15.1.el6

kernel-doc

2.6.32-642.15.1.el6

kernel-firmware

2.6.32-642.15.1.el6

kernel-headers

2.6.32-642.15.1.el6

perf

2.6.32-642.15.1.el6

python-perf

2.6.32-642.15.1.el6

Связанные CVE

Связанные уязвимости

CVSS3: 4.7
ubuntu
почти 9 лет назад

Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.

CVSS3: 5.3
redhat
почти 9 лет назад

Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.

CVSS3: 4.7
nvd
почти 9 лет назад

Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.

CVSS3: 4.7
debian
почти 9 лет назад

Race condition in the audit_log_single_execve_arg function in kernel/a ...

CVSS3: 9.8
ubuntu
больше 8 лет назад

The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.