Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-2430

Опубликовано: 10 июн. 2020
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2020-2430: kernel security and bug fix update (MODERATE)

[2.6.32-754.30.2.OL6]

  • Update genkey [bug 25599697]

[2.6.32-754.30.2]

  • x86/speculation: Provide SRBDS late microcode loading support (Waiman Long)
  • [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827185] {CVE-2020-0543}
  • [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827185] {CVE-2020-0543}
  • [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827185] {CVE-2020-0543}
  • [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827185] {CVE-2020-0543}
  • [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827185] {CVE-2020-0543}
  • [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827185] {CVE-2020-0543}
  • [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827185] {CVE-2020-0543}
  • [x86] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827185] {CVE-2020-0543}

[2.6.32-754.30.1]

  • [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827226] {CVE-2020-10711}
  • [netdrv] bonding: don't set slave->link in bond_update_speed_duplex() (Patrick Talbert) [1828604]
  • [security] KEYS: prevent KEYCTL_READ on negative key (Patrick Talbert) [1498368] {CVE-2017-12192}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel

2.6.32-754.30.2.el6

kernel-abi-whitelists

2.6.32-754.30.2.el6

kernel-debug

2.6.32-754.30.2.el6

kernel-debug-devel

2.6.32-754.30.2.el6

kernel-devel

2.6.32-754.30.2.el6

kernel-doc

2.6.32-754.30.2.el6

kernel-firmware

2.6.32-754.30.2.el6

kernel-headers

2.6.32-754.30.2.el6

perf

2.6.32-754.30.2.el6

python-perf

2.6.32-754.30.2.el6

Oracle Linux i686

kernel

2.6.32-754.30.2.el6

kernel-abi-whitelists

2.6.32-754.30.2.el6

kernel-debug

2.6.32-754.30.2.el6

kernel-debug-devel

2.6.32-754.30.2.el6

kernel-devel

2.6.32-754.30.2.el6

kernel-doc

2.6.32-754.30.2.el6

kernel-firmware

2.6.32-754.30.2.el6

kernel-headers

2.6.32-754.30.2.el6

perf

2.6.32-754.30.2.el6

python-perf

2.6.32-754.30.2.el6

Связанные CVE

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
redhat
почти 8 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
nvd
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
debian
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Mana ...

CVSS3: 5.5
github
около 3 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.