Описание
ELSA-2020-2430: kernel security and bug fix update (MODERATE)
[2.6.32-754.30.2.OL6]
- Update genkey [bug 25599697]
[2.6.32-754.30.2]
- x86/speculation: Provide SRBDS late microcode loading support (Waiman Long)
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827185] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827185] {CVE-2020-0543}
- [x86] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827185] {CVE-2020-0543}
[2.6.32-754.30.1]
- [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827226] {CVE-2020-10711}
- [netdrv] bonding: don't set slave->link in bond_update_speed_duplex() (Patrick Talbert) [1828604]
- [security] KEYS: prevent KEYCTL_READ on negative key (Patrick Talbert) [1498368] {CVE-2017-12192}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel
2.6.32-754.30.2.el6
kernel-abi-whitelists
2.6.32-754.30.2.el6
kernel-debug
2.6.32-754.30.2.el6
kernel-debug-devel
2.6.32-754.30.2.el6
kernel-devel
2.6.32-754.30.2.el6
kernel-doc
2.6.32-754.30.2.el6
kernel-firmware
2.6.32-754.30.2.el6
kernel-headers
2.6.32-754.30.2.el6
perf
2.6.32-754.30.2.el6
python-perf
2.6.32-754.30.2.el6
Oracle Linux i686
kernel
2.6.32-754.30.2.el6
kernel-abi-whitelists
2.6.32-754.30.2.el6
kernel-debug
2.6.32-754.30.2.el6
kernel-debug-devel
2.6.32-754.30.2.el6
kernel-devel
2.6.32-754.30.2.el6
kernel-doc
2.6.32-754.30.2.el6
kernel-firmware
2.6.32-754.30.2.el6
kernel-headers
2.6.32-754.30.2.el6
perf
2.6.32-754.30.2.el6
python-perf
2.6.32-754.30.2.el6
Связанные CVE
Связанные уязвимости
The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.
The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.
The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.
The keyctl_read_key function in security/keys/keyctl.c in the Key Mana ...
The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.