Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-3218

Опубликовано: 30 июл. 2020
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2020-3218: kernel security and bug fix update (MODERATE)

[4.18.0-193.14.3_2.OL8]

  • Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15-2.0.3.el7

[4.18.0-193.14.3_2]

  • Reverse keys order for dual-signing (Frantisek Hrbata) [1837433 1837434] {CVE-2020-10713}

[4.18.0-193.14.2_2]

  • [kernel] Move to dual-signing to split signing keys up better (pjones) [1837433 1837434] {CVE-2020-10713}
  • [crypto] pefile: Tolerate other pefile signatures after first (Lenny Szubowicz) [1837433 1837434] {CVE-2020-10713}
  • [acpi] ACPI: configfs: Disallow loading ACPI tables when locked down (Lenny Szubowicz) [1852968 1852969] {CVE-2020-15780}
  • [firmware] efi: Restrict efivar_ssdt_load when the kernel is locked down (Lenny Szubowicz) [1852948 1852949] {CVE-2019-20908}

[4.18.0-193.14.1_2]

  • [md] dm mpath: add DM device name to Failing/Reinstating path log messages (Mike Snitzer) [1852050 1822975]
  • [md] dm mpath: enhance queue_if_no_path debugging (Mike Snitzer) [1852050 1822975]
  • [md] dm mpath: restrict queue_if_no_path state machine (Mike Snitzer) [1852050 1822975]
  • [md] dm mpath: simplify __must_push_back (Mike Snitzer) [1852050 1822975]
  • [md] dm: use DMDEBUG macros now that they use pr_debug variants (Mike Snitzer) [1852050 1822975]
  • [include] dm: use dynamic debug instead of compile-time config option (Mike Snitzer) [1852050 1822975]
  • [md] dm mpath: switch paths in dm_blk_ioctl() code path (Mike Snitzer) [1852050 1822975]
  • [md] dm multipath: use updated MPATHF_QUEUE_IO on mapping for bio-based mpath (Mike Snitzer) [1852050 1822975]
  • [md] dm: bump version of core and various targets (Mike Snitzer) [1852050 1822975]
  • [md] dm mpath: Add timeout mechanism for queue_if_no_path (Mike Snitzer) [1852050 1822975]
  • [md] dm mpath: use true_false for bool variable (Mike Snitzer) [1852050 1822975]
  • [md] dm mpath: remove harmful bio-based optimization (Mike Snitzer) [1852050 1822975]
  • [scsi] scsi: libiscsi: fall back to sendmsg for slab pages (Maurizio Lombardi) [1852048 1825775]
  • [s390] s390/mm: fix panic in gup_fast on large pud (Philipp Rudo) [1853336 1816980]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bpftool

4.18.0-193.14.3.el8_2

kernel-cross-headers

4.18.0-193.14.3.el8_2

kernel-headers

4.18.0-193.14.3.el8_2

kernel-tools

4.18.0-193.14.3.el8_2

kernel-tools-libs

4.18.0-193.14.3.el8_2

kernel-tools-libs-devel

4.18.0-193.14.3.el8_2

perf

4.18.0-193.14.3.el8_2

python3-perf

4.18.0-193.14.3.el8_2

Oracle Linux x86_64

bpftool

4.18.0-193.14.3.el8_2

kernel

4.18.0-193.14.3.el8_2

kernel-abi-whitelists

4.18.0-193.14.3.el8_2

kernel-core

4.18.0-193.14.3.el8_2

kernel-cross-headers

4.18.0-193.14.3.el8_2

kernel-debug

4.18.0-193.14.3.el8_2

kernel-debug-core

4.18.0-193.14.3.el8_2

kernel-debug-devel

4.18.0-193.14.3.el8_2

kernel-debug-modules

4.18.0-193.14.3.el8_2

kernel-debug-modules-extra

4.18.0-193.14.3.el8_2

kernel-devel

4.18.0-193.14.3.el8_2

kernel-doc

4.18.0-193.14.3.el8_2

kernel-headers

4.18.0-193.14.3.el8_2

kernel-modules

4.18.0-193.14.3.el8_2

kernel-modules-extra

4.18.0-193.14.3.el8_2

kernel-tools

4.18.0-193.14.3.el8_2

kernel-tools-libs

4.18.0-193.14.3.el8_2

kernel-tools-libs-devel

4.18.0-193.14.3.el8_2

perf

4.18.0-193.14.3.el8_2

python3-perf

4.18.0-193.14.3.el8_2

Связанные CVE

Связанные уязвимости

suse-cvrf
около 5 лет назад

Security update for the Linux Kernel

suse-cvrf
около 5 лет назад

Security update for the Linux Kernel

CVSS3: 6.7
ubuntu
около 5 лет назад

An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.

CVSS3: 6.4
redhat
около 6 лет назад

An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.

CVSS3: 6.7
nvd
около 5 лет назад

An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.