Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-4270

Опубликовано: 08 нояб. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-4270: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.14.35-1818.4.5]

  • x86/intel/spectre_v2: Remove unnecessary retp_compiler() test (Boris Ostrovsky) [Orabug: 28814574]
  • x86/intel/spectre_v4: Deprecate spec_store_bypass_disable=userspace (Boris Ostrovsky) [Orabug: 28814574]
  • x86/speculation: x86_spec_ctrl_set needs to be called unconditionally (Boris Ostrovsky) [Orabug: 28814574]
  • x86/speculation: Drop unused DISABLE_IBRS_CLOBBER macro (Boris Ostrovsky) [Orabug: 28814574]
  • x86/intel/spectre_v4: Keep SPEC_CTRL_SSBD when IBRS is in use (Boris Ostrovsky) [Orabug: 28814574]

[4.14.35-1818.4.4]

  • ocfs2: fix ocfs2 read block panic (Junxiao Bi) [Orabug: 28821391]
  • scsi: sg: mitigate read/write abuse (Jann Horn) [Orabug: 28824731] {CVE-2017-13168}
  • hugetlbfs: introduce truncation/fault mutex to avoid races (Mike Kravetz) [Orabug: 28776542]
  • rds: MPRDS messages delivered out of order (Ka-Cheong Poon) [Orabug: 28838051]
  • x86/bugs: rework x86_spec_ctrl_set to make its changes explicit (Daniel Jordan) [Orabug: 28270952]
  • x86/bugs: rename ssbd_ibrs_selected to ssbd_userspace_selected (Daniel Jordan) [Orabug: 28270952]
  • x86/bugs: x86_spec_ctrl_set may not disable IBRS on kernel idle (Daniel Jordan) [Orabug: 28270952]
  • x86/bugs: always use x86_spec_ctrl_base or _priv when setting spec ctrl MSR (Daniel Jordan) [Orabug: 28270952]
  • iommu: turn on iommu=pt by default (Tushar Dave) [Orabug: 28111039]
  • vhost/scsi: Use common handling code in request queue handler (Bijan Mottahedeh) [Orabug: 28775556]
  • vhost/scsi: Extract common handling code from control queue handler (Bijan Mottahedeh) [Orabug: 28775556]
  • vhost/scsi: Respond to control queue operations (Bijan Mottahedeh) [Orabug: 28775556]

[4.14.35-1818.4.3]

  • Fix error code in nfs_lookup_verify_inode() (Lance Shelton) [Orabug: 28807515]
  • x86/speculation: Retpoline should always be available on Skylake (Alexandre Chartre) [Orabug: 28801830]
  • x86/bugs: ssbd_ibrs_selected called prematurely (Daniel Jordan) [Orabug: 28802799]
  • net/mlx4_core: print firmware version during driver loading (Qing Huang) [Orabug: 28809382]
  • hugetlbfs: dirty pages as they are added to pagecache (Mike Kravetz) [Orabug: 28813999]

[4.14.35-1818.4.2]

  • infiniband: fix a possible use-after-free bug (Cong Wang) [Orabug: 28774511] {CVE-2018-14734}
  • nfs: fix a deadlock in nfs client initialization (Scott Mayhew) [Orabug: 28775910]
  • x86/speculation: Unconditionally fill RSB on context switch (Alejandro Jimenez) [Orabug: 28631576] {CVE-2018-15572}
  • bnxt_re: Implement the shutdown hook of the L2-RoCE driver interface (Somnath Kotur) [Orabug: 28539344]
  • rds: RDS (tcp) hangs on sendto() to unresponding address (Ka-Cheong Poon) [Orabug: 28762597]
  • uek-rpm: aarch64 some XGENE drivers must be be modules (Tom Saeger) [Orabug: 28769119]
  • arm64: KVM: Sanitize PSTATE.M when being set from userspace (Marc Zyngier) [Orabug: 28762424] {CVE-2018-18021}
  • arm64: KVM: Tighten guest core register access from userspace (Dave Martin) [Orabug: 28762424] {CVE-2018-18021}
  • iommu/amd: Clear memory encryption mask from physical address (Singh, Brijesh) [Orabug: 28770185]

[4.14.35-1818.4.1]

  • mm: get rid of vmacache_flush_all() entirely (Linus Torvalds) [Orabug: 28700955] {CVE-2018-17182}
  • Btrfs: fix log replay failure after unlink and link combination (Filipe Manana) [Orabug: 27941939]
  • x86/speculation: Add sysfs entry to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
  • x86/speculation: Allow IBRS firmware to be enabled when IBRS is disabled (Alexandre Chartre) [Orabug: 28753851]
  • x86/speculation: Remove unnecessary retpoline alternatives (Alexandre Chartre) [Orabug: 28753851]
  • x86/speculation: Use static key to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
  • bnxt_en: Fix memory fault in bnxt_ethtool_init() (Vasundhara Volam) [Orabug: 28632641]
  • IB/core: Initialize relaxed_pd properly (Yuval Shaia) [Orabug: 28197305]

[4.14.35-1818.4.0]

  • e1000e: Fix link check race condition (Benjamin Poirier) [Orabug: 28489384]
  • Revert 'e1000e: Separate signaling for link check/link up' (Benjamin Poirier) [Orabug: 28489384]
  • e1000e: Avoid missed interrupts following ICR read (Benjamin Poirier) [Orabug: 28489384]
  • e1000e: Fix queue interrupt re-raising in Other interrupt (Benjamin Poirier) [Orabug: 28489384]
  • Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (Benjamin Poirier) [Orabug: 28489384]
  • e1000e: Remove Other from EIAC (Benjamin Poirier) [Orabug: 28489384]
  • btrfs: validate type when reading a chunk (Gu Jinxiang) [Orabug: 28700851] {CVE-2018-14611}
  • btrfs: Check that each block group has corresponding chunk at mount time (Qu Wenruo) [Orabug: 28700872] {CVE-2018-14610}
  • net: rds: Use address family to designate IPv4 or IPv6 addresses (Hakon Bugge) [Orabug: 28720069]
  • net: rds: Fix blank at eol in af_rds.c (Hakon Bugge) [Orabug: 28720069]

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

kernel-uek

4.14.35-1818.4.5.el7uek

kernel-uek-debug

4.14.35-1818.4.5.el7uek

kernel-uek-debug-devel

4.14.35-1818.4.5.el7uek

kernel-uek-devel

4.14.35-1818.4.5.el7uek

kernel-uek-headers

4.14.35-1818.4.5.el7uek

kernel-uek-tools

4.14.35-1818.4.5.el7uek

kernel-uek-tools-libs

4.14.35-1818.4.5.el7uek

kernel-uek-tools-libs-devel

4.14.35-1818.4.5.el7uek

perf

4.14.35-1818.4.5.el7uek

python-perf

4.14.35-1818.4.5.el7uek

Oracle Linux x86_64

kernel-uek

4.14.35-1818.4.5.el7uek

kernel-uek-debug

4.14.35-1818.4.5.el7uek

kernel-uek-debug-devel

4.14.35-1818.4.5.el7uek

kernel-uek-devel

4.14.35-1818.4.5.el7uek

kernel-uek-doc

4.14.35-1818.4.5.el7uek

kernel-uek-tools

4.14.35-1818.4.5.el7uek

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233.

CVSS3: 4.7
redhat
больше 7 лет назад

An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233.

CVSS3: 7.8
nvd
больше 7 лет назад

An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233.

CVSS3: 7.8
debian
больше 7 лет назад

An elevation of privilege vulnerability in the kernel scsi driver. Pro ...

CVSS3: 7.8
github
около 3 лет назад

An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233.

Уязвимость ELSA-2018-4270