SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
(Oracle Issues Fix for Oracle Linux) Linux Kernel DCCP Processing Flaw Lets Remote Users Cause the Target System to Crash
SecurityTracker Alert ID:  1037916
SecurityTracker URL:  http://securitytracker.com/id/1037916
CVE Reference:   CVE-2017-2634   (Links to External Site)
Date:  Feb 28 2017
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Oracle Linux 5
Description:   A vulnerability was reported in the Linux kernel. A remote user can cause the target system to crash.

The Datagram Congestion Control Protocol (DCCP) implementation uses the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections. A remote user can send a specially crafted DCCP reset packet via IPv6 to the target DCCP server to trigger a memory corruption error and cause the target kernel to crash.

Wade Mealing (Red Hat Product Security) reported this vulnerability.

Impact:   A remote user can cause the target kernel to crash.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-0323-1.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-0323-1.html (Links to External Site)
Cause:   Access control error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Feb 27 2017 Linux Kernel DCCP Processing Flaw Lets Remote Users Cause the Target System to Crash



 Source Message Contents

Subject:  [El-errata] ELSA-2017-0323-1 Important: Oracle Linux 5 kernel security update

Oracle Linux Security Advisory ELSA-2017-0323-1

http://linux.oracle.com/errata/ELSA-2017-0323-1.html

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-2.6.18-419.0.0.0.1.el5.i686.rpm
kernel-PAE-2.6.18-419.0.0.0.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-419.0.0.0.1.el5.i686.rpm
kernel-debug-2.6.18-419.0.0.0.1.el5.i686.rpm
kernel-debug-devel-2.6.18-419.0.0.0.1.el5.i686.rpm
kernel-devel-2.6.18-419.0.0.0.1.el5.i686.rpm
kernel-doc-2.6.18-419.0.0.0.1.el5.noarch.rpm
kernel-headers-2.6.18-419.0.0.0.1.el5.i386.rpm
kernel-xen-2.6.18-419.0.0.0.1.el5.i686.rpm
kernel-xen-devel-2.6.18-419.0.0.0.1.el5.i686.rpm

x86_64:
kernel-2.6.18-419.0.0.0.1.el5.x86_64.rpm
kernel-debug-2.6.18-419.0.0.0.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-419.0.0.0.1.el5.x86_64.rpm
kernel-devel-2.6.18-419.0.0.0.1.el5.x86_64.rpm
kernel-doc-2.6.18-419.0.0.0.1.el5.noarch.rpm
kernel-headers-2.6.18-419.0.0.0.1.el5.x86_64.rpm
kernel-xen-2.6.18-419.0.0.0.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-419.0.0.0.1.el5.x86_64.rpm

ia64:
kernel-2.6.18-419.0.0.0.1.el5.ia64.rpm
kernel-debug-2.6.18-419.0.0.0.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-419.0.0.0.1.el5.ia64.rpm
kernel-devel-2.6.18-419.0.0.0.1.el5.ia64.rpm
kernel-doc-2.6.18-419.0.0.0.1.el5.noarch.rpm
kernel-headers-2.6.18-419.0.0.0.1.el5.ia64.rpm
kernel-xen-2.6.18-419.0.0.0.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-419.0.0.0.1.el5.ia64.rpm


SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-2.6.18-419.0.0.0.1.el5.src.rpm

The following packages were rebuilt to be in sync with the updated 
kernel version (no changes other than updating the version number):
i386:
oracleasm-2.6.18-419.0.0.0.1.el5-2.0.5-2.el5.i686.rpm
oracleasm-2.6.18-419.0.0.0.1.el5PAE-2.0.5-2.el5.i686.rpm
oracleasm-2.6.18-419.0.0.0.1.el5xen-2.0.5-2.el5.i686.rpm
oracleasm-2.6.18-419.0.0.0.1.el5debug-2.0.5-2.el5.i686.rpm
ocfs2-2.6.18-419.0.0.0.1.el5-1.4.11-1.el5.i686.rpm
ocfs2-2.6.18-419.0.0.0.1.el5PAE-1.4.11-1.el5.i686.rpm
ocfs2-2.6.18-419.0.0.0.1.el5xen-1.4.11-1.el5.i686.rpm
ocfs2-2.6.18-419.0.0.0.1.el5debug-1.4.11-1.el5.i686.rpm

x86_64:
oracleasm-2.6.18-419.0.0.0.1.el5-2.0.5-2.el5.x86_64.rpm
oracleasm-2.6.18-419.0.0.0.1.el5xen-2.0.5-2.el5.x86_64.rpm
oracleasm-2.6.18-419.0.0.0.1.el5debug-2.0.5-2.el5.x86_64.rpm
ocfs2-2.6.18-419.0.0.0.1.el5-1.4.11-1.el5.x86_64.rpm
ocfs2-2.6.18-419.0.0.0.1.el5xen-1.4.11-1.el5.x86_64.rpm
ocfs2-2.6.18-419.0.0.0.1.el5debug-1.4.11-1.el5.x86_64.rpm

ia64:
oracleasm-2.6.18-419.0.0.0.1.el5-2.0.5-2.el5.ia64.rpm
oracleasm-2.6.18-419.0.0.0.1.el5xen-2.0.5-2.el5.ia64.rpm
oracleasm-2.6.18-419.0.0.0.1.el5debug-2.0.5-2.el5.ia64.rpm
ocfs2-2.6.18-419.0.0.0.1.el5-1.4.11-1.el5.ia64.rpm
ocfs2-2.6.18-419.0.0.0.1.el5xen-1.4.11-1.el5.ia64.rpm
ocfs2-2.6.18-419.0.0.0.1.el5debug-1.4.11-1.el5.ia64.rpm


SRPMS:
http://oss.oracle.com/el5/SRPMS-updates/oracleasm-2.6.18-419.0.0.0.1.el5-2.0.5-2.el5.src.rpm
http://oss.oracle.com/el5/SRPMS-updates/ocfs2-2.6.18-419.0.0.0.1.el5-1.4.11-1.el5.src.rpm


Description of changes:

kernel
- 2.6.18-419.0.0.0.1.el5
- [netfront] fix ring buffer index go back led vif stop [orabug 18272251]
- [net] fix tcp_trim_head() (James Li) [orabug 14512145, 19219078]
- ocfs2: dlm: fix recovery hung (Junxiao Bi) [orabug 13956772]
- i386: fix MTRR code (Zhenzhong Duan) [orabug 15862649]
- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]
- [oprofile] export __get_user_pages_fast() function [orabug 14277030]
- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 
14277030]
- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]
- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 
14277030]
- [kernel] Initialize the local uninitialized variable stats. [orabug 
14051367]
- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 
13477763]
- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]
- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong 
Duan)
- [x86] use dynamic vcpu_info remap to support more than 32 vcpus 
(Zhenzhong Duan)
- [x86] Fix lvt0 reset when hvm boot up with noapic param
- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, 
Chris Mason)
   [orabug 12342275]
- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 
12561346]
- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]
- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) 
[orabug 12740042]
- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) 
[orabug 12687646]
- fix filp_close() race (Joe Jin) [orabug 10335998]
- make xenkbd.abs_pointer=1 by default [orabug 67188919]
- [xen] check to see if hypervisor supports memory reservation change
   (Chuck Anderson) [orabug 7556514]
- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf 
(John Sobecki)
   [orabug 10315433]
- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]
- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding
   hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]
- [mm] Enhance shrink_zone patch allow full swap utilization, and also be
   NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 
9245919]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)
   [orabug 9107465]
- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)
   [orabug 9764220]
- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,
   Guru Anbalagane) [orabug 6124033]
- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
- [ib] fix memory corruption (Andy Grover) [orabug 9972346]
- [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) 
[orabug 14795203]


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC