Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-5644

Опубликовано: 10 апр. 2020
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2020-5644: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [3.8.13-118.44.1]

  • net: qlogic: Fix memory leak in ql_alloc_large_buffers (Navid Emamdoost) [Orabug: 31055328] {CVE-2019-18806}
  • swiotlb: clean up reporting (Kees Cook) [Orabug: 31085018] {CVE-2018-5953}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-118.44.1.el6uek

0.4.5-3.el6

kernel-uek

3.8.13-118.44.1.el6uek

kernel-uek-debug

3.8.13-118.44.1.el6uek

kernel-uek-debug-devel

3.8.13-118.44.1.el6uek

kernel-uek-devel

3.8.13-118.44.1.el6uek

kernel-uek-doc

3.8.13-118.44.1.el6uek

kernel-uek-firmware

3.8.13-118.44.1.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-3.8.13-118.44.1.el7uek

0.4.5-3.el7

kernel-uek

3.8.13-118.44.1.el7uek

kernel-uek-debug

3.8.13-118.44.1.el7uek

kernel-uek-debug-devel

3.8.13-118.44.1.el7uek

kernel-uek-devel

3.8.13-118.44.1.el7uek

kernel-uek-doc

3.8.13-118.44.1.el7uek

kernel-uek-firmware

3.8.13-118.44.1.el7uek

Связанные CVE

Связанные уязвимости

oracle-oval
около 5 лет назад

ELSA-2020-5642: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
около 5 лет назад

ELSA-2020-5649: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 5.5
ubuntu
почти 7 лет назад

The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.

redhat
почти 7 лет назад

The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.

CVSS3: 5.5
nvd
почти 7 лет назад

The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.