Описание
ELSA-2020-5706: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [3.8.13-118.46.1]
- ipv6: only static routes qualify for equal cost multipathing (Hannes Frederic Sowa) [Orabug: 30977687] {CVE-2013-4125}
- USB: adutux: fix use-after-free on disconnect (Johan Hovold) [Orabug: 31240296] {CVE-2019-19523}
- USB: core: Fix races in character device registration and deregistraion (Alan Stern) [Orabug: 31317668] {CVE-2019-19537}
- USB: iowarrior: fix use-after-free on disconnect (Johan Hovold) [Orabug: 31351063] {CVE-2019-19528}
- usb: iowarrior: fix deadlock on disconnect (Oliver Neukum) [Orabug: 31351063] {CVE-2019-19528}
- mremap: properly flush TLB before releasing the page (Linus Torvalds) [Orabug: 31352012] {CVE-2018-18281}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dtrace-modules-3.8.13-118.46.1.el6uek
0.4.5-3.el6
kernel-uek
3.8.13-118.46.1.el6uek
kernel-uek-debug
3.8.13-118.46.1.el6uek
kernel-uek-debug-devel
3.8.13-118.46.1.el6uek
kernel-uek-devel
3.8.13-118.46.1.el6uek
kernel-uek-doc
3.8.13-118.46.1.el6uek
kernel-uek-firmware
3.8.13-118.46.1.el6uek
Oracle Linux 7
Oracle Linux x86_64
dtrace-modules-3.8.13-118.46.1.el7uek
0.4.5-3.el7
kernel-uek
3.8.13-118.46.1.el7uek
kernel-uek-debug
3.8.13-118.46.1.el7uek
kernel-uek-debug-devel
3.8.13-118.46.1.el7uek
kernel-uek-devel
3.8.13-118.46.1.el7uek
kernel-uek-doc
3.8.13-118.46.1.el7uek
kernel-uek-firmware
3.8.13-118.46.1.el7uek
Ссылки на источники
Связанные уязвимости
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack ...
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.