Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-4301

Опубликовано: 09 дек. 2018
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT)

[2.6.39-400.304.1]

  • mnt: Prevent pivot_root from creating a loop in the mount tree (Eric W. Biederman) [Orabug: 26575709] {CVE-2014-7970} {CVE-2014-7970}
  • vfs: more mnt_parent cleanups (Al Viro) [Orabug: 26575709] {CVE-2014-7970}
  • vfs: new internal helper: mnt_has_parent(mnt) (Al Viro) [Orabug: 26575709] {CVE-2014-7970}
  • ALSA: seq: Fix racy pool initializations (Takashi Iwai) [Orabug: 28459730] {CVE-2018-7566}
  • xen-netback: calculate full_coalesce before the pre-estimation of ring buffer slots to consume (Dongli Zhang) [Orabug: 28818690]
  • scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (Alexander Potapenko) [Orabug: 28892695] {CVE-2018-1000204}
  • KVM: MTRR: remove MSR 0x2f8 (Andy Honig) [Orabug: 28901711] {CVE-2016-3713} {CVE-2016-3713}
  • cdrom: fix improper type cast, which can leat to information leak. (Young_X) [Orabug: 28929788] {CVE-2018-16658} {CVE-2018-10940} {CVE-2018-18710}
  • udf: Check component length before reading it (Jan Kara) [Orabug: 28941923] {CVE-2014-9728}
  • udf: Verify symlink size before loading it (Shan Hai) [Orabug: 28941923] {CVE-2014-9728}
  • udf: Verify i_size when loading inode (Shan Hai) [Orabug: 28941923] {CVE-2014-9728}
  • floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (Andy Whitcroft) [Orabug: 28956549] {CVE-2018-7755} {CVE-2018-7755}
  • crypto: salsa20 - fix blkcipher_walk API usage (Eric Biggers) [Orabug: 28976586] {CVE-2017-17805}
  • crypto: hmac - require that the underlying hash algorithm is unkeyed (Eric Biggers) [Orabug: 28976655] {CVE-2017-17806}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.39-400.304.1.el5uek

kernel-uek-debug

2.6.39-400.304.1.el5uek

kernel-uek-debug-devel

2.6.39-400.304.1.el5uek

kernel-uek-devel

2.6.39-400.304.1.el5uek

kernel-uek-doc

2.6.39-400.304.1.el5uek

kernel-uek-firmware

2.6.39-400.304.1.el5uek

Oracle Linux i386

kernel-uek

2.6.39-400.304.1.el5uek

kernel-uek-debug

2.6.39-400.304.1.el5uek

kernel-uek-debug-devel

2.6.39-400.304.1.el5uek

kernel-uek-devel

2.6.39-400.304.1.el5uek

kernel-uek-doc

2.6.39-400.304.1.el5uek

kernel-uek-firmware

2.6.39-400.304.1.el5uek

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.39-400.304.1.el6uek

kernel-uek-debug

2.6.39-400.304.1.el6uek

kernel-uek-debug-devel

2.6.39-400.304.1.el6uek

kernel-uek-devel

2.6.39-400.304.1.el6uek

kernel-uek-doc

2.6.39-400.304.1.el6uek

kernel-uek-firmware

2.6.39-400.304.1.el6uek

Oracle Linux i686

kernel-uek

2.6.39-400.304.1.el6uek

kernel-uek-debug

2.6.39-400.304.1.el6uek

kernel-uek-debug-devel

2.6.39-400.304.1.el6uek

kernel-uek-devel

2.6.39-400.304.1.el6uek

kernel-uek-doc

2.6.39-400.304.1.el6uek

kernel-uek-firmware

2.6.39-400.304.1.el6uek

Связанные уязвимости

oracle-oval
больше 6 лет назад

ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
больше 6 лет назад

ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 5.5
ubuntu
больше 10 лет назад

The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.

redhat
больше 10 лет назад

The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.

CVSS3: 5.5
nvd
больше 10 лет назад

The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.