Описание
ELSA-2019-0415: kernel security and bug fix update (IMPORTANT)
[2.6.32-754.11.1.OL6]
- Update genkey [bug 25599697]
[2.6.32-754.11.1]
- [x86] mm/fault: Allow stack access below rsp (Waiman Long) [1644401]
- [sound] alsa: rawmidi: Change resized buffers atomically (Denys Vlasenko) [1593083] {CVE-2018-10902}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel
2.6.32-754.11.1.el6
kernel-abi-whitelists
2.6.32-754.11.1.el6
kernel-debug
2.6.32-754.11.1.el6
kernel-debug-devel
2.6.32-754.11.1.el6
kernel-devel
2.6.32-754.11.1.el6
kernel-doc
2.6.32-754.11.1.el6
kernel-firmware
2.6.32-754.11.1.el6
kernel-headers
2.6.32-754.11.1.el6
perf
2.6.32-754.11.1.el6
python-perf
2.6.32-754.11.1.el6
Oracle Linux i686
kernel
2.6.32-754.11.1.el6
kernel-abi-whitelists
2.6.32-754.11.1.el6
kernel-debug
2.6.32-754.11.1.el6
kernel-debug-devel
2.6.32-754.11.1.el6
kernel-devel
2.6.32-754.11.1.el6
kernel-doc
2.6.32-754.11.1.el6
kernel-firmware
2.6.32-754.11.1.el6
kernel-headers
2.6.32-754.11.1.el6
perf
2.6.32-754.11.1.el6
python-perf
2.6.32-754.11.1.el6
Связанные CVE
Связанные уязвимости
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
It was found that the raw midi kernel driver does not protect against ...
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.