Описание
ELSA-2019-4576: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [3.8.13-118.31.1]
- alarmtimer: Prevent overflow for relative nanosleep (Thomas Gleixner) [Orabug: 29269167] {CVE-2018-13053}
- KEYS: Don't permit request_key() to construct a new keyring (David Howells) [Orabug: 29304552] {CVE-2017-17807}
- KEYS: add missing permission check for request_key() destination (Eric Biggers) [Orabug: 29304552] {CVE-2017-17807}
- ext4: only look at the bg_flags field if it is valid (Theodore Ts'o) [Orabug: 29409425] {CVE-2018-10876} {CVE-2018-10876}
- net: Set sk_prot_creator when cloning sockets to the right proto (Christoph Paasch) [Orabug: 29422740] {CVE-2018-9568}
- ext4: make sure bitmaps and the inode table don't overlap with bg descriptors (Theodore Ts'o) [Orabug: 29428608] {CVE-2018-10878}
- ext4: always check block group bounds in ext4_init_block_bitmap() (Theodore Ts'o) [Orabug: 29428608] {CVE-2018-10878}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dtrace-modules-3.8.13-118.31.1.el6uek
0.4.5-3.el6
kernel-uek
3.8.13-118.31.1.el6uek
kernel-uek-debug
3.8.13-118.31.1.el6uek
kernel-uek-debug-devel
3.8.13-118.31.1.el6uek
kernel-uek-devel
3.8.13-118.31.1.el6uek
kernel-uek-doc
3.8.13-118.31.1.el6uek
kernel-uek-firmware
3.8.13-118.31.1.el6uek
Oracle Linux 7
Oracle Linux x86_64
dtrace-modules-3.8.13-118.31.1.el7uek
0.4.5-3.el7
kernel-uek
3.8.13-118.31.1.el7uek
kernel-uek-debug
3.8.13-118.31.1.el7uek
kernel-uek-debug-devel
3.8.13-118.31.1.el7uek
kernel-uek-devel
3.8.13-118.31.1.el7uek
kernel-uek-doc
3.8.13-118.31.1.el7uek
kernel-uek-firmware
3.8.13-118.31.1.el7uek
Ссылки на источники
Связанные уязвимости
ELSA-2019-4575: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT)
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.