Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-0790

Опубликовано: 12 мар. 2020
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2020-0790: kernel security and bug fix update (IMPORTANT)

[2.6.32-754.28.1.OL6]

  • Update genkey [bug 25599697]

[2.6.32-754.28.1]

  • [netdrv] ixgbevf: Use cached link state instead of re-reading the value for ethtool (Ken Cox) [1795404]
  • [isdn] mISDN: enforce CAP_NET_RAW for raw sockets (Andrea Claudi) [1779473] {CVE-2019-17055}
  • [net] cfg80211: wext: avoid copying malformed SSIDs (Jarod Wilson) [1778625] {CVE-2019-17133}
  • [netdrv] bonding: speed/duplex update at NETDEV_UP event (Patrick Talbert) [1772779]
  • [netdrv] bonding: make speed, duplex setting consistent with link state (Patrick Talbert) [1772779]
  • [netdrv] bonding: simplify / unify event handling code for 3ad mode (Patrick Talbert) [1772779]
  • [netdrv] bonding: unify all places where actor-oper key needs to be updated (Patrick Talbert) [1772779]
  • [netdrv] bonding: simple code refactor (Patrick Talbert) [1772779]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel

2.6.32-754.28.1.el6

kernel-abi-whitelists

2.6.32-754.28.1.el6

kernel-debug

2.6.32-754.28.1.el6

kernel-debug-devel

2.6.32-754.28.1.el6

kernel-devel

2.6.32-754.28.1.el6

kernel-doc

2.6.32-754.28.1.el6

kernel-firmware

2.6.32-754.28.1.el6

kernel-headers

2.6.32-754.28.1.el6

perf

2.6.32-754.28.1.el6

python-perf

2.6.32-754.28.1.el6

Oracle Linux i686

kernel

2.6.32-754.28.1.el6

kernel-abi-whitelists

2.6.32-754.28.1.el6

kernel-debug

2.6.32-754.28.1.el6

kernel-debug-devel

2.6.32-754.28.1.el6

kernel-devel

2.6.32-754.28.1.el6

kernel-doc

2.6.32-754.28.1.el6

kernel-firmware

2.6.32-754.28.1.el6

kernel-headers

2.6.32-754.28.1.el6

perf

2.6.32-754.28.1.el6

python-perf

2.6.32-754.28.1.el6

Связанные CVE

Связанные уязвимости

suse-cvrf
больше 5 лет назад

Security update for the Linux Kernel

suse-cvrf
больше 5 лет назад

Security update for the Linux Kernel

CVSS3: 3.3
ubuntu
больше 5 лет назад

base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.

CVSS3: 4
redhat
почти 6 лет назад

base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.

CVSS3: 3.3
nvd
больше 5 лет назад

base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.