Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-4244

Опубликовано: 10 окт. 2018
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2018-4244: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.1.12-124.20.1]

  • bnxt_en: xdp: don't make drivers report attachment mode (partial backport) (Somasundaram Krishnasamy) [Orabug: 27988326]
  • bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (Nikita V. Shirokov) [Orabug: 27988326]
  • bnxt_en: add meta pointer for direct access (partial backport) (Somasundaram Krishnasamy) [Orabug: 27988326]
  • bnxt_en: Fix bug in ethtool -L. (Michael Chan) [Orabug: 27988326]
  • bpf: bnxt: Report bpf_prog ID during XDP_QUERY_PROG (Martin KaFai Lau) [Orabug: 27988326]
  • bnxt_en: Optimize doorbell write operations for newer chips (reapply). (Michael Chan) [Orabug: 27988326]
  • bnxt_en: Use short TX BDs for the XDP TX ring. (Michael Chan) [Orabug: 27988326]
  • bnxt_en: Add ethtool mac loopback self test (reapply). (Michael Chan) [Orabug: 27988326]
  • bnxt_en: Add support for XDP_TX action. (Michael Chan) [Orabug: 27988326]
  • bnxt_en: Add basic XDP support. (Michael Chan) [Orabug: 27988326]
  • x86/ia32: Restore r8 correctly in 32bit SYSCALL instruction entry. (Gayatri Vasudevan) [Orabug: 28529706]
  • net: enable RPS on vlan devices (Shannon Nelson) [Orabug: 28645929]
  • xen-blkback: hold write vbd-lock while swapping the vbd (Ankur Arora) [Orabug: 28651655]
  • xen-blkback: implement swapping of active vbd (Ankur Arora) [Orabug: 28651655]
  • xen-blkback: emit active physical device to xenstore (Ankur Arora) [Orabug: 28651655]
  • xen-blkback: refactor backend_changed() (Ankur Arora) [Orabug: 28651655]
  • xen-blkback: pull out blkif grant features from vbd (Ankur Arora) [Orabug: 28651655]
  • mm: get rid of vmacache_flush_all() entirely (Linus Torvalds) [Orabug: 28701016] {CVE-2018-17182}

[4.1.12-124.19.9]

  • rds: crash at rds_ib_inc_copy_to_user+104 due to NULL ptr reference (Venkat Venkatsubra) [Orabug: 28506569]

[4.1.12-124.19.8]

  • IB/core: For multicast functions, verify that LIDs are multicast LIDs (Michael J. Ruhl) [Orabug: 28700490]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

4.1.12-124.20.1.el6uek

kernel-uek-debug

4.1.12-124.20.1.el6uek

kernel-uek-debug-devel

4.1.12-124.20.1.el6uek

kernel-uek-devel

4.1.12-124.20.1.el6uek

kernel-uek-doc

4.1.12-124.20.1.el6uek

kernel-uek-firmware

4.1.12-124.20.1.el6uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

4.1.12-124.20.1.el7uek

kernel-uek-debug

4.1.12-124.20.1.el7uek

kernel-uek-debug-devel

4.1.12-124.20.1.el7uek

kernel-uek-devel

4.1.12-124.20.1.el7uek

kernel-uek-doc

4.1.12-124.20.1.el7uek

kernel-uek-firmware

4.1.12-124.20.1.el7uek

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.

CVSS3: 7
redhat
почти 7 лет назад

An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.

CVSS3: 7.8
nvd
почти 7 лет назад

An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.

CVSS3: 7.8
debian
почти 7 лет назад

An issue was discovered in the Linux kernel through 4.18.8. The vmacac ...

suse-cvrf
больше 6 лет назад

Security update for the Linux Kernel