Oracle Linux 6255 Published by

the following updates has been released for Oracle Linux:

ELSA-2017-3606 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2017-3606 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2017-3607 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2017-3605)



ELSA-2017-3606 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2017-3606

http://linux.oracle.com/errata/ELSA-2017-3606.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-firmware-3.8.13-118.19.4.el6uek.noarch.rpm
kernel-uek-doc-3.8.13-118.19.4.el6uek.noarch.rpm
kernel-uek-3.8.13-118.19.4.el6uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.19.4.el6uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.19.4.el6uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.19.4.el6uek.x86_64.rpm
dtrace-modules-3.8.13-118.19.4.el6uek-0.4.5-3.el6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-3.8.13-118.19.4.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/dtrace-modules-3.8.13-118.19.4.el6uek-0.4.5-3.el6.src.rpm



Description of changes:

kernel-uek
[3.8.13-118.19.4.el6uek]
- l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind() (Guillaume
Nault) [Orabug: 26586047] {CVE-2016-10200}
- xfs: fix two memory leaks in xfs_attr_list.c error paths (Mateusz
Guzik) [Orabug: 26586022] {CVE-2016-9685}
- KEYS: Disallow keyrings beginning with '.' to be joined as session
keyrings (David Howells) [Orabug: 26585994] {CVE-2016-9604}
- ipv6: fix out of bound writes in __ip6_append_data() (Eric Dumazet)
[Orabug: 26578198] {CVE-2017-9242}

ELSA-2017-3606 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2017-3606

http://linux.oracle.com/errata/ELSA-2017-3606.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
kernel-uek-firmware-3.8.13-118.19.4.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-118.19.4.el7uek.noarch.rpm
kernel-uek-3.8.13-118.19.4.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.19.4.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.19.4.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.19.4.el7uek.x86_64.rpm
dtrace-modules-3.8.13-118.19.4.el7uek-0.4.5-3.el7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-118.19.4.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-118.19.4.el7uek-0.4.5-3.el7.src.rpm



Description of changes:

kernel-uek
[3.8.13-118.19.4.el7uek]
- l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind() (Guillaume
Nault) [Orabug: 26586047] {CVE-2016-10200}
- xfs: fix two memory leaks in xfs_attr_list.c error paths (Mateusz
Guzik) [Orabug: 26586022] {CVE-2016-9685}
- KEYS: Disallow keyrings beginning with '.' to be joined as session
keyrings (David Howells) [Orabug: 26585994] {CVE-2016-9604}
- ipv6: fix out of bound writes in __ip6_append_data() (Eric Dumazet)
[Orabug: 26578198] {CVE-2017-9242}

ELSA-2017-3607 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update

Oracle Linux Security Advisory ELSA-2017-3607

http://linux.oracle.com/errata/ELSA-2017-3607.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
kernel-uek-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-debug-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-devel-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-doc-2.6.39-400.297.6.el6uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.297.6.el6uek.noarch.rpm

x86_64:
kernel-uek-firmware-2.6.39-400.297.6.el6uek.noarch.rpm
kernel-uek-doc-2.6.39-400.297.6.el6uek.noarch.rpm
kernel-uek-2.6.39-400.297.6.el6uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.297.6.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.297.6.el6uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.297.6.el6uek.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.39-400.297.6.el6uek.src.rpm



Description of changes:

[2.6.39-400.297.6.el6uek]
- l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind() (Guillaume
Nault) [Orabug: 26586050] {CVE-2016-10200}
- xfs: fix two memory leaks in xfs_attr_list.c error paths (Mateusz
Guzik) [Orabug: 26586024] {CVE-2016-9685}
- KEYS: Disallow keyrings beginning with '.' to be joined as session
keyrings (David Howells) [Orabug: 26586002] {CVE-2016-9604}
- ipv6: fix out of bound writes in __ip6_append_data() (Eric Dumazet)
[Orabug: 26578202] {CVE-2017-9242}

New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2017-3605)

Synopsis: ELSA-2017-3605 can now be patched using Ksplice
CVEs: CVE-2016-10200 CVE-2016-6213 CVE-2016-9604 CVE-2017-7533 CVE-2017-9242

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-3605.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-9242: Denial-of-service when using send syscall of IPV6 socket.

A missing check when sending messages over IPV6 sockets could lead to an
out-of-bound access. A local user could use this flaw to cause a
denial-of-service.


* CVE-2016-10200: Denial-of-service when creating L2TP sockets using concurrent thread.

A missing check when creating L2TP socket could lead to a use-after-free
if a concurrent thread modify socket's flag while creating it. An attacker
could use this flaw to cause a denial-of-service.


* CVE-2016-9604: Permission bypass when creating key using keyring subsystem.

A missing check when an user create a key beginning with '.' could lead
to a permission bypass. A local attacker could use this flaw to access
sensitive information.


* CVE-2017-7533: Privilege escalation in inotify during file rename.

A race condition in inotify when renaming a file can result in kernel
memory corruption. A local attacker could use this flaw to escalate
privileges.


* CVE-2016-6213: Denial-of-service when bind mounting filesystems.

A missing limit could cause an overflow of the mount table. A user with
mount permissions could cause a denial-of-service by bind mounting many
filesystems and overflowing the mount table.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.