Описание
ELSA-2019-4577: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.307.1]
- proc: restrict kernel stack dumps to root (John Donnelly) [Orabug: 29114880] {CVE-2018-17972}
- alarmtimer: Prevent overflow for relative nanosleep (Thomas Gleixner) [Orabug: 29269182] {CVE-2018-13053}
- ext4: only look at the bg_flags field if it is valid (Theodore Ts'o) [Orabug: 29409428] {CVE-2018-10876} {CVE-2018-10876}
- vfs: Add sb_rdonly(sb) to query the MS_RDONLY flag on s_flags (David Howells) [Orabug: 29409428] {CVE-2018-10876}
- net: Set sk_prot_creator when cloning sockets to the right proto (Christoph Paasch) [Orabug: 29422741] {CVE-2018-9568}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.307.1.el5uek
kernel-uek-debug
2.6.39-400.307.1.el5uek
kernel-uek-debug-devel
2.6.39-400.307.1.el5uek
kernel-uek-devel
2.6.39-400.307.1.el5uek
kernel-uek-doc
2.6.39-400.307.1.el5uek
kernel-uek-firmware
2.6.39-400.307.1.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.307.1.el5uek
kernel-uek-debug
2.6.39-400.307.1.el5uek
kernel-uek-debug-devel
2.6.39-400.307.1.el5uek
kernel-uek-devel
2.6.39-400.307.1.el5uek
kernel-uek-doc
2.6.39-400.307.1.el5uek
kernel-uek-firmware
2.6.39-400.307.1.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.307.1.el6uek
kernel-uek-debug
2.6.39-400.307.1.el6uek
kernel-uek-debug-devel
2.6.39-400.307.1.el6uek
kernel-uek-devel
2.6.39-400.307.1.el6uek
kernel-uek-doc
2.6.39-400.307.1.el6uek
kernel-uek-firmware
2.6.39-400.307.1.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.307.1.el6uek
kernel-uek-debug
2.6.39-400.307.1.el6uek
kernel-uek-debug-devel
2.6.39-400.307.1.el6uek
kernel-uek-devel
2.6.39-400.307.1.el6uek
kernel-uek-doc
2.6.39-400.307.1.el6uek
kernel-uek-firmware
2.6.39-400.307.1.el6uek
Связанные уязвимости
ELSA-2019-0512: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2019-4576: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4541: Unbreakable Enterprise kernel security update (IMPORTANT)
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.