Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-0717

Опубликовано: 11 апр. 2019
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2019-0717: kernel security and bug fix update (IMPORTANT)

[2.6.32-754.12.1.OL6]

  • Update genkey [bug 25599697]

[2.6.32-754.12.1]

  • [x86] vDSO: Don't generate retpoline for indirect call (Waiman Long) [1638552]
  • [fs] cifs: fix reparse point/symlink breakage (Leif Sahlberg) [1636484]
  • [scsi] qla2xxx: Mask off Scope bits in retry delay (Himanshu Madhani) [1588133]
  • [net] tcp: make tcp_retransmit_timer a no-op on empty write queue (Paolo Abeni) [1585892]
  • [kernel] sched/sysctl: Check user input value of sysctl_sched_time_avg (Lauro Ramos Venancio) [1579128]
  • [fs] Fix up non-directory creation in SGID directories (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] hugetlbfs: switch to inode_init_owner() (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] udf: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] ubifs: replace inode uid, gid, mode initialization with helper function (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] ramfs: replace inode uid, gid, mode initialization with helper function (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] ext4: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] ext3: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] ext2: replace inode uid, gid, mode init with helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] btrfs: replace inode uid, gid, mode initialization with helper function (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [fs] vfs: Add inode uid,gid,mode init helper (Miklos Szeredi) [1600951] {CVE-2018-13405}
  • [s390] kernel: adapt to changed CPU vulnerabilities function prototypes (Hendrik Brueckner) [1625381]
  • [s390] detect etoken facility (Hendrik Brueckner) [1625381]
  • [s390] Correct register corruption in critical section cleanup (Hendrik Brueckner) [1625381]
  • [s390] remove indirect branch from do_softirq_own_stack (Hendrik Brueckner) [1625381]
  • [s390] move spectre sysfs attribute code (Hendrik Brueckner) [1625381]
  • [s390] kernel: use expoline for indirect branches (Hendrik Brueckner) [1625381]
  • [s390] ftrace: use expoline for indirect branches (Hendrik Brueckner) [1625381]
  • [s390] move expoline assembler macros to a header (Hendrik Brueckner) [1625381]
  • [s390] correct module section names for expoline code revert (Hendrik Brueckner) [1625381]
  • [x86] speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (Oleksandr Natalenko) [1670328]
  • [perf] Fix a race between ring_buffer_detach() and ring_buffer_attach() (Jiri Olsa) [1589340]
  • [perf] Fix mmap() accounting hole (Jiri Olsa) [1627672]
  • [perf] Fix perf mmap bugs (Jiri Olsa) [1627672]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel

2.6.32-754.12.1.el6

kernel-abi-whitelists

2.6.32-754.12.1.el6

kernel-debug

2.6.32-754.12.1.el6

kernel-debug-devel

2.6.32-754.12.1.el6

kernel-devel

2.6.32-754.12.1.el6

kernel-doc

2.6.32-754.12.1.el6

kernel-firmware

2.6.32-754.12.1.el6

kernel-headers

2.6.32-754.12.1.el6

perf

2.6.32-754.12.1.el6

python-perf

2.6.32-754.12.1.el6

Oracle Linux i686

kernel

2.6.32-754.12.1.el6

kernel-abi-whitelists

2.6.32-754.12.1.el6

kernel-debug

2.6.32-754.12.1.el6

kernel-debug-devel

2.6.32-754.12.1.el6

kernel-devel

2.6.32-754.12.1.el6

kernel-doc

2.6.32-754.12.1.el6

kernel-firmware

2.6.32-754.12.1.el6

kernel-headers

2.6.32-754.12.1.el6

perf

2.6.32-754.12.1.el6

python-perf

2.6.32-754.12.1.el6

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVSS3: 4.4
redhat
почти 7 лет назад

The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVSS3: 7.8
nvd
почти 7 лет назад

The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

CVSS3: 7.8
debian
почти 7 лет назад

The inode_init_owner function in fs/inode.c in the Linux kernel throug ...

CVSS3: 7.8
github
около 3 лет назад

The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.