Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-3640

Опубликовано: 13 нояб. 2017
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2017-3640: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.1.12-103.9.4]

  • thp: run vma_adjust_trans_huge() outside i_mmap_rwsem (Kirill A. Shutemov) [Orabug: 27026180]

[4.1.12-103.9.3]

  • selinux: fix off-by-one in setprocattr (Stephen Smalley) [Orabug: 27001717] {CVE-2017-2618} {CVE-2017-2618} {CVE-2017-2618}
  • sysctl: Drop reference added by grab_header in proc_sys_readdir (Zhou Chengming) [Orabug: 27036903] {CVE-2016-9191} {CVE-2016-9191} {CVE-2016-9191}
  • KEYS: prevent KEYCTL_READ on negative key (Eric Biggers) [Orabug: 27050248] {CVE-2017-12192}
  • IB/ipoib: For sendonly join free the multicast group on leave (Christoph Lameter) [Orabug: 27077718]
  • IB/ipoib: increase the max mcast backlog queue (Doug Ledford) [Orabug: 27077718]
  • IB/ipoib: Make sendonly multicast joins create the mcast group (Doug Ledford) [Orabug: 27077718]
  • IB/ipoib: Expire sendonly multicast joins (Christoph Lameter) [Orabug: 27077718]
  • IB/ipoib: Suppress warning for send only join failures (Jason Gunthorpe) [Orabug: 27077718]
  • IB/ipoib: Clean up send-only multicast joins (Doug Ledford) [Orabug: 27077718]
  • netlink: allow to listen 'all' netns (Nicolas Dichtel) [Orabug: 27077944]
  • netlink: rename private flags and states (Nicolas Dichtel) [Orabug: 27077944]
  • netns: use a spin_lock to protect nsid management (Nicolas Dichtel) [Orabug: 27077944]
  • netns: notify new nsid outside __peernet2id() (Nicolas Dichtel) [Orabug: 27077944]
  • netns: rename peernet2id() to peernet2id_alloc() (Nicolas Dichtel) [Orabug: 27077944]
  • netns: always provide the id to rtnl_net_fill() (Nicolas Dichtel) [Orabug: 27077944]
  • netns: returns always an id in __peernet2id() (Nicolas Dichtel) [Orabug: 27077944]
  • Hang/soft lockup in d_invalidate with simultaneous calls (Al Viro) [Orabug: 27052681]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

4.1.12-103.9.4.el6uek

kernel-uek-debug

4.1.12-103.9.4.el6uek

kernel-uek-debug-devel

4.1.12-103.9.4.el6uek

kernel-uek-devel

4.1.12-103.9.4.el6uek

kernel-uek-doc

4.1.12-103.9.4.el6uek

kernel-uek-firmware

4.1.12-103.9.4.el6uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

4.1.12-103.9.4.el7uek

kernel-uek-debug

4.1.12-103.9.4.el7uek

kernel-uek-debug-devel

4.1.12-103.9.4.el7uek

kernel-uek-devel

4.1.12-103.9.4.el7uek

kernel-uek-doc

4.1.12-103.9.4.el7uek

kernel-uek-firmware

4.1.12-103.9.4.el7uek

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
redhat
почти 8 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
nvd
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
debian
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Mana ...

CVSS3: 5.5
github
около 3 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.