Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-3651

Опубликовано: 27 нояб. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-3651: kernel security, bug fix, and enhancement update (MODERATE)

[3.10.0-957.1.3.el7.OL7]

  • Oracle Linux certificates (Alexey Petrenko)
  • Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_ key.x509)(alexey.petrenko@oracle.com)
  • Update x509.genkey [bug 24817676]

[3.10.0-957.1.3.el7]

  • [x86] Mark Intel Cascade Lake supported (Steve Best) [1650213 1639980]

[3.10.0-957.1.2.el7]

  • [net] rtnetlink: give a user socket to get_target_net() (Jiri Benc) [1639635 1630694] {CVE-2018-14646}
  • [net] Add variants of capable for use on on sockets (Jiri Benc) [1639635 1630694] {CVE-2018-14646}

[3.10.0-957.1.1.el7]

  • [x86] boot: Fix kexec booting failure in the SEV bit detection code (Kairui Song) [1644990 1628828]
  • [net] 8021q: create device with all possible features in wanted_features (Davide Caratti) [1644675 1640645]
  • [mm] memcontrol: fix high scheduling latency source in mem_cgroup_reparent_charges (Andrea Arcangeli) [1644673 1632898]
  • [kernel] cpuset: use trialcs->mems_allowed as a temp variable (Aristeu Rozanski) [1644236 1613248]
  • [kernel] cpuset: fix a warning when clearing configured masks in old hierarchy (Aristeu Rozanski) [1644236 1613248]
  • [kernel] cpuset: initialize effective masks when clone_children is enabled (Aristeu Rozanski) [1644236 1613248]
  • [x86] efi: Only load initrd above 4g on second try (Lenny Szubowicz) [1643359 1608955]
  • [x86] efi: Support initrd loaded above 4G (Lenny Szubowicz) [1643359 1608955]
  • [x86] efi: Generalize handle_ramdisks() and rename to handle_cmdline_files() (Lenny Szubowicz) [1643359 1608955]
  • [kernel] sched/fair: Fix throttle_list starvation with low CFS quota (Phil Auld) [1640675 1601153]
  • [target] scsi: iscsi: Use bin2hex instead of a re-implementation (Maurizio Lombardi) [1634711 1627034] {CVE-2018-14633}
  • [target] scsi: iscsi: Use hex2bin instead of a re-implementation (Maurizio Lombardi) [1634711 1627034] {CVE-2018-14633}

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

bpftool

3.10.0-957.1.3.el7

kernel

3.10.0-957.1.3.el7

kernel-abi-whitelists

3.10.0-957.1.3.el7

kernel-debug

3.10.0-957.1.3.el7

kernel-debug-devel

3.10.0-957.1.3.el7

kernel-devel

3.10.0-957.1.3.el7

kernel-doc

3.10.0-957.1.3.el7

kernel-headers

3.10.0-957.1.3.el7

kernel-tools

3.10.0-957.1.3.el7

kernel-tools-libs

3.10.0-957.1.3.el7

kernel-tools-libs-devel

3.10.0-957.1.3.el7

perf

3.10.0-957.1.3.el7

python-perf

3.10.0-957.1.3.el7

Связанные CVE

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.

CVSS3: 5.5
redhat
больше 6 лет назад

The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.

CVSS3: 5.5
nvd
больше 6 лет назад

The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.

CVSS3: 5.5
debian
больше 6 лет назад

The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL ...

CVSS3: 7
ubuntu
больше 6 лет назад

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.