the following updates has been released for Oracle Linux:
ELSA-2017-3606 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2017-3606 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2017-3607 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2017-3605)
ELSA-2017-3606 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
ELSA-2017-3606 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
ELSA-2017-3607 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2017-3605)
ELSA-2017-3606 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2017-3606
http://linux.oracle.com/errata/ELSA-2017-3606.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-firmware-3.8.13-118.19.4.el6uek.noarch.rpm
kernel-uek-doc-3.8.13-118.19.4.el6uek.noarch.rpm
kernel-uek-3.8.13-118.19.4.el6uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.19.4.el6uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.19.4.el6uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.19.4.el6uek.x86_64.rpm
dtrace-modules-3.8.13-118.19.4.el6uek-0.4.5-3.el6.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-3.8.13-118.19.4.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/dtrace-modules-3.8.13-118.19.4.el6uek-0.4.5-3.el6.src.rpm
Description of changes:
kernel-uek
[3.8.13-118.19.4.el6uek]
- l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind() (Guillaume
Nault) [Orabug: 26586047] {CVE-2016-10200}
- xfs: fix two memory leaks in xfs_attr_list.c error paths (Mateusz
Guzik) [Orabug: 26586022] {CVE-2016-9685}
- KEYS: Disallow keyrings beginning with '.' to be joined as session
keyrings (David Howells) [Orabug: 26585994] {CVE-2016-9604}
- ipv6: fix out of bound writes in __ip6_append_data() (Eric Dumazet)
[Orabug: 26578198] {CVE-2017-9242}
ELSA-2017-3606 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2017-3606
http://linux.oracle.com/errata/ELSA-2017-3606.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
kernel-uek-firmware-3.8.13-118.19.4.el7uek.noarch.rpm
kernel-uek-doc-3.8.13-118.19.4.el7uek.noarch.rpm
kernel-uek-3.8.13-118.19.4.el7uek.x86_64.rpm
kernel-uek-devel-3.8.13-118.19.4.el7uek.x86_64.rpm
kernel-uek-debug-devel-3.8.13-118.19.4.el7uek.x86_64.rpm
kernel-uek-debug-3.8.13-118.19.4.el7uek.x86_64.rpm
dtrace-modules-3.8.13-118.19.4.el7uek-0.4.5-3.el7.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-3.8.13-118.19.4.el7uek.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/dtrace-modules-3.8.13-118.19.4.el7uek-0.4.5-3.el7.src.rpm
Description of changes:
kernel-uek
[3.8.13-118.19.4.el7uek]
- l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind() (Guillaume
Nault) [Orabug: 26586047] {CVE-2016-10200}
- xfs: fix two memory leaks in xfs_attr_list.c error paths (Mateusz
Guzik) [Orabug: 26586022] {CVE-2016-9685}
- KEYS: Disallow keyrings beginning with '.' to be joined as session
keyrings (David Howells) [Orabug: 26585994] {CVE-2016-9604}
- ipv6: fix out of bound writes in __ip6_append_data() (Eric Dumazet)
[Orabug: 26578198] {CVE-2017-9242}
ELSA-2017-3607 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Oracle Linux Security Advisory ELSA-2017-3607
http://linux.oracle.com/errata/ELSA-2017-3607.html
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-debug-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-devel-2.6.39-400.297.6.el6uek.i686.rpm
kernel-uek-doc-2.6.39-400.297.6.el6uek.noarch.rpm
kernel-uek-firmware-2.6.39-400.297.6.el6uek.noarch.rpm
x86_64:
kernel-uek-firmware-2.6.39-400.297.6.el6uek.noarch.rpm
kernel-uek-doc-2.6.39-400.297.6.el6uek.noarch.rpm
kernel-uek-2.6.39-400.297.6.el6uek.x86_64.rpm
kernel-uek-devel-2.6.39-400.297.6.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-400.297.6.el6uek.x86_64.rpm
kernel-uek-debug-2.6.39-400.297.6.el6uek.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.39-400.297.6.el6uek.src.rpm
Description of changes:
[2.6.39-400.297.6.el6uek]
- l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind() (Guillaume
Nault) [Orabug: 26586050] {CVE-2016-10200}
- xfs: fix two memory leaks in xfs_attr_list.c error paths (Mateusz
Guzik) [Orabug: 26586024] {CVE-2016-9685}
- KEYS: Disallow keyrings beginning with '.' to be joined as session
keyrings (David Howells) [Orabug: 26586002] {CVE-2016-9604}
- ipv6: fix out of bound writes in __ip6_append_data() (Eric Dumazet)
[Orabug: 26578202] {CVE-2017-9242}
New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2017-3605)
Synopsis: ELSA-2017-3605 can now be patched using Ksplice
CVEs: CVE-2016-10200 CVE-2016-6213 CVE-2016-9604 CVE-2017-7533 CVE-2017-9242
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-3605.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-9242: Denial-of-service when using send syscall of IPV6 socket.
A missing check when sending messages over IPV6 sockets could lead to an
out-of-bound access. A local user could use this flaw to cause a
denial-of-service.
* CVE-2016-10200: Denial-of-service when creating L2TP sockets using concurrent thread.
A missing check when creating L2TP socket could lead to a use-after-free
if a concurrent thread modify socket's flag while creating it. An attacker
could use this flaw to cause a denial-of-service.
* CVE-2016-9604: Permission bypass when creating key using keyring subsystem.
A missing check when an user create a key beginning with '.' could lead
to a permission bypass. A local attacker could use this flaw to access
sensitive information.
* CVE-2017-7533: Privilege escalation in inotify during file rename.
A race condition in inotify when renaming a file can result in kernel
memory corruption. A local attacker could use this flaw to escalate
privileges.
* CVE-2016-6213: Denial-of-service when bind mounting filesystems.
A missing limit could cause an overflow of the mount table. A user with
mount permissions could cause a denial-of-service by bind mounting many
filesystems and overflowing the mount table.
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.