Описание
ELSA-2018-4299: Unbreakable Enterprise kernel security update (IMPORTANT)
[4.1.12-124.23.1]
- xfs: don't call xfs_da_shrink_inode with NULL bp (Eric Sandeen) [Orabug: 28898616] {CVE-2018-13094}
- ALSA: rawmidi: Change resized buffers atomically (Takashi Iwai) [Orabug: 28898636] {CVE-2018-10902}
- md/raid5: fix a race condition in stripe batch (Shaohua Li) [Orabug: 28917012]
- xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE (Darrick J. Wong) [Orabug: 28924091] {CVE-2018-18690}
- certs: Add Oracle's new X509 cert into the kernel keyring (Eric Snowberg) [Orabug: 28926203]
- block: fix bdi vs gendisk lifetime mismatch (Shan Hai) [Orabug: 28945039]
- Add the following entries to 'uek-rpm/ol[67]/nano_modules.list': kernel/drivers/net/net_failover.ko kernel/net/core/failover.ko Fixes: b3bc7c163fc9 ('net: Introduce generic failover module') (Vijay Balakrishna) [Orabug: 28953351]
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (Andy Whitcroft) [Orabug: 28956547] {CVE-2018-7755} {CVE-2018-7755}
- iov_iter: don't revert iov buffer if csum error (Ding Tianhong) [Orabug: 28960296]
- crypto: salsa20 - fix blkcipher_walk API usage (Eric Biggers) [Orabug: 28976583] {CVE-2017-17805}
- crypto: hmac - require that the underlying hash algorithm is unkeyed (Eric Biggers) [Orabug: 28976653] {CVE-2017-17806}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
4.1.12-124.23.1.el6uek
kernel-uek-debug
4.1.12-124.23.1.el6uek
kernel-uek-debug-devel
4.1.12-124.23.1.el6uek
kernel-uek-devel
4.1.12-124.23.1.el6uek
kernel-uek-doc
4.1.12-124.23.1.el6uek
kernel-uek-firmware
4.1.12-124.23.1.el6uek
Oracle Linux 7
Oracle Linux x86_64
kernel-uek
4.1.12-124.23.1.el7uek
kernel-uek-debug
4.1.12-124.23.1.el7uek
kernel-uek-debug-devel
4.1.12-124.23.1.el7uek
kernel-uek-devel
4.1.12-124.23.1.el7uek
kernel-uek-doc
4.1.12-124.23.1.el7uek
kernel-uek-firmware
4.1.12-124.23.1.el7uek
Ссылки на источники
Связанные уязвимости
ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT)
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.