Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-2102

Опубликовано: 13 мая 2020
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2020-2102: kernel security and bug fix update (IMPORTANT)

[4.18.0-193.1.2_2.OL8]

  • Oracle Linux certificates (Alexey Petrenko)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]

[4.18.0-193.1.2_2]

  • [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827249 1827251] {CVE-2020-10711}
  • [mm] s390/mm: fix page table upgrade vs 2ndary address mode accesses (Vladis Dronov) [1828153 1828154] {CVE-2020-11884}

[4.18.0-193.1.1_2]

  • [x86] kvm: x86: clear stale x86_emulate_ctxt->intercept value (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
  • [x86] kvm: vmx: check descriptor table exits on instruction emulation (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
  • [x86] kvm: nvmx: Check IO instruction VM-exit conditions (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
  • [x86] kvm: nvmx: Refactor IO bitmap checks into helper function (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
  • [x86] kvm: nvmx: Don't emulate instructions in guest mode (Jon Maloy) [1824398 1806817] {CVE-2020-2732}
  • [sound] ALSA: usb-audio: set the interface format after resume on Dell WD19 (Perry Yuan) [1821376 1807965]
  • [kernel] sched: Avoid scale real weight down to zero (Phil Auld) [1819909 1808562]
  • [netdrv] hv_netvsc: Fix unwanted rx_table reset (Mohammed Gamal) [1817945 1805950]
  • [netdrv] hv_netvsc: Fix tx_table init in rndis_set_subchannel() (Mohammed Gamal) [1817945 1805950]
  • [netdrv] hv_netvsc: Fix send_table offset in case of a host bug (Mohammed Gamal) [1817945 1805950]
  • [netdrv] hv_netvsc: Fix offset usage in netvsc_send_table() (Mohammed Gamal) [1817945 1805950]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bpftool

4.18.0-193.1.2.el8_2

kernel-cross-headers

4.18.0-193.1.2.el8_2

kernel-headers

4.18.0-193.1.2.el8_2

kernel-tools

4.18.0-193.1.2.el8_2

kernel-tools-libs

4.18.0-193.1.2.el8_2

kernel-tools-libs-devel

4.18.0-193.1.2.el8_2

perf

4.18.0-193.1.2.el8_2

python3-perf

4.18.0-193.1.2.el8_2

Oracle Linux x86_64

bpftool

4.18.0-193.1.2.el8_2

kernel

4.18.0-193.1.2.el8_2

kernel-abi-whitelists

4.18.0-193.1.2.el8_2

kernel-core

4.18.0-193.1.2.el8_2

kernel-cross-headers

4.18.0-193.1.2.el8_2

kernel-debug

4.18.0-193.1.2.el8_2

kernel-debug-core

4.18.0-193.1.2.el8_2

kernel-debug-devel

4.18.0-193.1.2.el8_2

kernel-debug-modules

4.18.0-193.1.2.el8_2

kernel-debug-modules-extra

4.18.0-193.1.2.el8_2

kernel-devel

4.18.0-193.1.2.el8_2

kernel-doc

4.18.0-193.1.2.el8_2

kernel-headers

4.18.0-193.1.2.el8_2

kernel-modules

4.18.0-193.1.2.el8_2

kernel-modules-extra

4.18.0-193.1.2.el8_2

kernel-tools

4.18.0-193.1.2.el8_2

kernel-tools-libs

4.18.0-193.1.2.el8_2

kernel-tools-libs-devel

4.18.0-193.1.2.el8_2

perf

4.18.0-193.1.2.el8_2

python3-perf

4.18.0-193.1.2.el8_2

Связанные уязвимости

CVSS3: 5.8
ubuntu
около 5 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

CVSS3: 5.8
redhat
больше 5 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

CVSS3: 5.8
nvd
около 5 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

CVSS3: 5.8
debian
около 5 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instr ...

github
около 3 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.