Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-3535

Опубликовано: 31 мар. 2017
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2017-3535: Unbreakable Enterprise kernel security update (IMPORTANT)

[2.6.39-400.294.6]

  • RHEL: complement upstream workaround for CVE-2016-10142. (Quentin Casasnovas) [Orabug: 25765786] {CVE-2016-10142} {CVE-2016-10142}

[2.6.39-400.294.5]

  • net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766914] {CVE-2016-8399}
  • ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765786] {CVE-2016-10142}
  • sg_write()/bsg_write() is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765448] {CVE-2016-10088}
  • scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25752011] {CVE-2017-7187}

[2.6.39-400.294.4]

  • tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696689] {CVE-2017-2636}
  • TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696689] {CVE-2017-2636}
  • drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696689] {CVE-2017-2636}
  • list: introduce list_first_entry_or_null (Jiri Pirko) [Orabug: 25696689] {CVE-2017-2636}
  • firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451538] {CVE-2016-8633}
  • x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463929] {CVE-2016-3672}
  • x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463929] {CVE-2016-3672}
  • sg_start_req(): make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490377] {CVE-2015-5707}
  • tcp: take care of truncations done by sk_filter() (Eric Dumazet) [Orabug: 25507232] {CVE-2016-8645}
  • rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507232] {CVE-2016-8645}
  • scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() (Dan Carpenter) [Orabug: 25507330] {CVE-2016-7425}
  • x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 25507375] {CVE-2015-4700}
  • net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512417] {CVE-2016-4580}
  • USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512472] {CVE-2016-3140}
  • net/llc: avoid BUG_ON() in skb_orphan() (Eric Dumazet) [Orabug: 25682437] {CVE-2017-6345}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.39-400.294.6.el5uek

kernel-uek-debug

2.6.39-400.294.6.el5uek

kernel-uek-debug-devel

2.6.39-400.294.6.el5uek

kernel-uek-devel

2.6.39-400.294.6.el5uek

kernel-uek-doc

2.6.39-400.294.6.el5uek

kernel-uek-firmware

2.6.39-400.294.6.el5uek

Oracle Linux i386

kernel-uek

2.6.39-400.294.6.el5uek

kernel-uek-debug

2.6.39-400.294.6.el5uek

kernel-uek-debug-devel

2.6.39-400.294.6.el5uek

kernel-uek-devel

2.6.39-400.294.6.el5uek

kernel-uek-doc

2.6.39-400.294.6.el5uek

kernel-uek-firmware

2.6.39-400.294.6.el5uek

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.39-400.294.6.el6uek

kernel-uek-debug

2.6.39-400.294.6.el6uek

kernel-uek-debug-devel

2.6.39-400.294.6.el6uek

kernel-uek-devel

2.6.39-400.294.6.el6uek

kernel-uek-doc

2.6.39-400.294.6.el6uek

kernel-uek-firmware

2.6.39-400.294.6.el6uek

Oracle Linux i686

kernel-uek

2.6.39-400.294.6.el6uek

kernel-uek-debug

2.6.39-400.294.6.el6uek

kernel-uek-debug-devel

2.6.39-400.294.6.el6uek

kernel-uek-devel

2.6.39-400.294.6.el6uek

kernel-uek-doc

2.6.39-400.294.6.el6uek

kernel-uek-firmware

2.6.39-400.294.6.el6uek

Связанные уязвимости

oracle-oval
около 8 лет назад

ELSA-2017-3534: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
около 8 лет назад

ELSA-2017-3533: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 6.8
ubuntu
больше 8 лет назад

drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.

CVSS3: 6.8
redhat
больше 8 лет назад

drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.

CVSS3: 6.8
nvd
больше 8 лет назад

drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.