Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-0415

Опубликовано: 26 фев. 2019
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2019-0415: kernel security and bug fix update (IMPORTANT)

[2.6.32-754.11.1.OL6]

  • Update genkey [bug 25599697]

[2.6.32-754.11.1]

  • [x86] mm/fault: Allow stack access below rsp (Waiman Long) [1644401]
  • [sound] alsa: rawmidi: Change resized buffers atomically (Denys Vlasenko) [1593083] {CVE-2018-10902}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel

2.6.32-754.11.1.el6

kernel-abi-whitelists

2.6.32-754.11.1.el6

kernel-debug

2.6.32-754.11.1.el6

kernel-debug-devel

2.6.32-754.11.1.el6

kernel-devel

2.6.32-754.11.1.el6

kernel-doc

2.6.32-754.11.1.el6

kernel-firmware

2.6.32-754.11.1.el6

kernel-headers

2.6.32-754.11.1.el6

perf

2.6.32-754.11.1.el6

python-perf

2.6.32-754.11.1.el6

Oracle Linux i686

kernel

2.6.32-754.11.1.el6

kernel-abi-whitelists

2.6.32-754.11.1.el6

kernel-debug

2.6.32-754.11.1.el6

kernel-debug-devel

2.6.32-754.11.1.el6

kernel-devel

2.6.32-754.11.1.el6

kernel-doc

2.6.32-754.11.1.el6

kernel-firmware

2.6.32-754.11.1.el6

kernel-headers

2.6.32-754.11.1.el6

perf

2.6.32-754.11.1.el6

python-perf

2.6.32-754.11.1.el6

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVSS3: 7.8
redhat
почти 7 лет назад

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVSS3: 7.8
nvd
почти 7 лет назад

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.

CVSS3: 7.8
debian
почти 7 лет назад

It was found that the raw midi kernel driver does not protect against ...

CVSS3: 7.8
github
около 3 лет назад

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.