Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-3509

Опубликовано: 12 янв. 2017
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2017-3509: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [3.8.13-118.16.2]

  • net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet) [Orabug: 25203623] {CVE-2016-9793}

[3.8.13-118.16.1]

  • nvme: Limit command retries (Ashok Vairavan) [Orabug: 25374794]
  • tcp: fix use after free in tcp_xmit_retransmit_queue() (Eric Dumazet) [Orabug: 25374371] {CVE-2016-6828}
  • logging errors that get masked to EIO inside drivers/block/loop.c (Manjunath Patil) [Orabug: 22505535]
  • ALSA: pcm : Call kill_fasync() in stream lock (Takashi Iwai) [Orabug: 25203963] {CVE-2016-9794}
  • packet: fix race condition in packet_set_ring (Philip Pettersson) [Orabug: 25217756] {CVE-2016-8655}
  • x86: kvmclock: zero initialize pvclock shared memory area (Igor Mammedov) [Orabug: 25218431]
  • KEYS: Fix short sprintf buffer in /proc/keys show function (David Howells) [Orabug: 25306373] {CVE-2016-7042}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-118.16.2.el6uek

0.4.5-3.el6

kernel-uek

3.8.13-118.16.2.el6uek

kernel-uek-debug

3.8.13-118.16.2.el6uek

kernel-uek-debug-devel

3.8.13-118.16.2.el6uek

kernel-uek-devel

3.8.13-118.16.2.el6uek

kernel-uek-doc

3.8.13-118.16.2.el6uek

kernel-uek-firmware

3.8.13-118.16.2.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-3.8.13-118.16.2.el7uek

0.4.5-3.el7

kernel-uek

3.8.13-118.16.2.el7uek

kernel-uek-debug

3.8.13-118.16.2.el7uek

kernel-uek-debug-devel

3.8.13-118.16.2.el7uek

kernel-uek-devel

3.8.13-118.16.2.el7uek

kernel-uek-doc

3.8.13-118.16.2.el7uek

kernel-uek-firmware

3.8.13-118.16.2.el7uek

Связанные уязвимости

oracle-oval
больше 8 лет назад

ELSA-2017-3508: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
больше 8 лет назад

ELSA-2017-3510: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
больше 8 лет назад

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.

CVSS3: 6.7
redhat
больше 8 лет назад

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.

CVSS3: 7.8
nvd
больше 8 лет назад

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.