Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-4299

Опубликовано: 06 дек. 2018
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2018-4299: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.1.12-124.23.1]

  • xfs: don't call xfs_da_shrink_inode with NULL bp (Eric Sandeen) [Orabug: 28898616] {CVE-2018-13094}
  • ALSA: rawmidi: Change resized buffers atomically (Takashi Iwai) [Orabug: 28898636] {CVE-2018-10902}
  • md/raid5: fix a race condition in stripe batch (Shaohua Li) [Orabug: 28917012]
  • xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE (Darrick J. Wong) [Orabug: 28924091] {CVE-2018-18690}
  • certs: Add Oracle's new X509 cert into the kernel keyring (Eric Snowberg) [Orabug: 28926203]
  • block: fix bdi vs gendisk lifetime mismatch (Shan Hai) [Orabug: 28945039]
  • Add the following entries to 'uek-rpm/ol[67]/nano_modules.list': kernel/drivers/net/net_failover.ko kernel/net/core/failover.ko Fixes: b3bc7c163fc9 ('net: Introduce generic failover module') (Vijay Balakrishna) [Orabug: 28953351]
  • floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (Andy Whitcroft) [Orabug: 28956547] {CVE-2018-7755} {CVE-2018-7755}
  • iov_iter: don't revert iov buffer if csum error (Ding Tianhong) [Orabug: 28960296]
  • crypto: salsa20 - fix blkcipher_walk API usage (Eric Biggers) [Orabug: 28976583] {CVE-2017-17805}
  • crypto: hmac - require that the underlying hash algorithm is unkeyed (Eric Biggers) [Orabug: 28976653] {CVE-2017-17806}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

4.1.12-124.23.1.el6uek

kernel-uek-debug

4.1.12-124.23.1.el6uek

kernel-uek-debug-devel

4.1.12-124.23.1.el6uek

kernel-uek-devel

4.1.12-124.23.1.el6uek

kernel-uek-doc

4.1.12-124.23.1.el6uek

kernel-uek-firmware

4.1.12-124.23.1.el6uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

4.1.12-124.23.1.el7uek

kernel-uek-debug

4.1.12-124.23.1.el7uek

kernel-uek-debug-devel

4.1.12-124.23.1.el7uek

kernel-uek-devel

4.1.12-124.23.1.el7uek

kernel-uek-doc

4.1.12-124.23.1.el7uek

kernel-uek-firmware

4.1.12-124.23.1.el7uek

Связанные уязвимости

oracle-oval
больше 6 лет назад

ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
больше 6 лет назад

ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
больше 7 лет назад

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

CVSS3: 5.5
redhat
больше 7 лет назад

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

CVSS3: 7.8
nvd
больше 7 лет назад

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.