Описание
ELSA-2019-4742: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.313.1]
- ACPI: sbshc: remove raw pointer from printk() message (Greg Kroah-Hartman) [Orabug: 27987133] {CVE-2018-5750}
- dm: fix race between dm_get_from_kobject() and __dm_destroy() (Hou Tao) [Orabug: 27987143] {CVE-2017-18203}
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (Eric Dumazet) [Orabug: 29886601] {CVE-2019-11477}
- tcp: add tcp_min_snd_mss sysctl (Eric Dumazet) [Orabug: 29884308] {CVE-2019-11479}
- tcp: tcp_fragment() should apply sane memory limits (Eric Dumazet) [Orabug: 29884308] {CVE-2019-11478}
- tcp: fix fack_count accounting on tcp_shift_skb_data() (Joao Martins) [Orabug: 29890843] {CVE-2019-11477}
- tcp: limit payload size of sacked skbs (Eric Dumazet) [Orabug: 29884308] {CVE-2019-11477}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.313.1.el5uek
kernel-uek-debug
2.6.39-400.313.1.el5uek
kernel-uek-debug-devel
2.6.39-400.313.1.el5uek
kernel-uek-devel
2.6.39-400.313.1.el5uek
kernel-uek-doc
2.6.39-400.313.1.el5uek
kernel-uek-firmware
2.6.39-400.313.1.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.313.1.el5uek
kernel-uek-debug
2.6.39-400.313.1.el5uek
kernel-uek-debug-devel
2.6.39-400.313.1.el5uek
kernel-uek-devel
2.6.39-400.313.1.el5uek
kernel-uek-doc
2.6.39-400.313.1.el5uek
kernel-uek-firmware
2.6.39-400.313.1.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.313.1.el6uek
kernel-uek-debug
2.6.39-400.313.1.el6uek
kernel-uek-debug-devel
2.6.39-400.313.1.el6uek
kernel-uek-devel
2.6.39-400.313.1.el6uek
kernel-uek-doc
2.6.39-400.313.1.el6uek
kernel-uek-firmware
2.6.39-400.313.1.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.313.1.el6uek
kernel-uek-debug
2.6.39-400.313.1.el6uek
kernel-uek-debug-devel
2.6.39-400.313.1.el6uek
kernel-uek-devel
2.6.39-400.313.1.el6uek
kernel-uek-doc
2.6.39-400.313.1.el6uek
kernel-uek-firmware
2.6.39-400.313.1.el6uek
Связанные CVE
Связанные уязвимости
ELSA-2018-4114: Unbreakable Enterprise kernel security update (IMPORTANT)
The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux ke ...