ID CVE-2018-18445
Summary In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
References
Vulnerable Configurations
  • Linux Kernel 4.14
    cpe:2.3:o:linux:linux_kernel:4.14
  • Linux Kernel 4.14.1
    cpe:2.3:o:linux:linux_kernel:4.14.1
  • Linux Kernel 4.14.2
    cpe:2.3:o:linux:linux_kernel:4.14.2
  • Linux Kernel 4.14.3
    cpe:2.3:o:linux:linux_kernel:4.14.3
  • Linux Kernel 4.14.4
    cpe:2.3:o:linux:linux_kernel:4.14.4
  • Linux Kernel 4.14.5
    cpe:2.3:o:linux:linux_kernel:4.14.5
  • Linux Kernel 4.14.6
    cpe:2.3:o:linux:linux_kernel:4.14.6
  • Linux Kernel 4.14.7
    cpe:2.3:o:linux:linux_kernel:4.14.7
  • Linux Kernel 4.14.8
    cpe:2.3:o:linux:linux_kernel:4.14.8
  • Linux Kernel 4.14.9
    cpe:2.3:o:linux:linux_kernel:4.14.9
  • Linux Kernel 4.14.10
    cpe:2.3:o:linux:linux_kernel:4.14.10
  • Linux Kernel 4.14.11
    cpe:2.3:o:linux:linux_kernel:4.14.11
  • Linux Kernel 4.14.12
    cpe:2.3:o:linux:linux_kernel:4.14.12
  • Linux Kernel 4.14.13
    cpe:2.3:o:linux:linux_kernel:4.14.13
  • Linux Kernel 4.14.14
    cpe:2.3:o:linux:linux_kernel:4.14.14
  • Linux Kernel 4.14.15
    cpe:2.3:o:linux:linux_kernel:4.14.15
  • Linux Kernel 4.14.16
    cpe:2.3:o:linux:linux_kernel:4.14.16
  • Linux Kernel 4.14.17
    cpe:2.3:o:linux:linux_kernel:4.14.17
  • Linux Kernel 4.14.18
    cpe:2.3:o:linux:linux_kernel:4.14.18
  • Linux Kernel 4.14.19
    cpe:2.3:o:linux:linux_kernel:4.14.19
  • Linux Kernel 4.14.20
    cpe:2.3:o:linux:linux_kernel:4.14.20
  • Linux Kernel 4.14.21
    cpe:2.3:o:linux:linux_kernel:4.14.21
  • Linux Kernel 4.14.22
    cpe:2.3:o:linux:linux_kernel:4.14.22
  • Linux Kernel 4.14.23
    cpe:2.3:o:linux:linux_kernel:4.14.23
  • Linux Kernel 4.14.24
    cpe:2.3:o:linux:linux_kernel:4.14.24
  • Linux Kernel 4.14.25
    cpe:2.3:o:linux:linux_kernel:4.14.25
  • Linux Kernel 4.14.26
    cpe:2.3:o:linux:linux_kernel:4.14.26
  • Linux Kernel 4.14.27
    cpe:2.3:o:linux:linux_kernel:4.14.27
  • Linux Kernel 4.14.28
    cpe:2.3:o:linux:linux_kernel:4.14.28
  • Linux Kernel 4.14.29
    cpe:2.3:o:linux:linux_kernel:4.14.29
  • Linux Kernel 4.14.30
    cpe:2.3:o:linux:linux_kernel:4.14.30
  • Linux Kernel 4.14.31
    cpe:2.3:o:linux:linux_kernel:4.14.31
  • Linux Kernel 4.14.32
    cpe:2.3:o:linux:linux_kernel:4.14.32
  • Linux Kernel 4.14.33
    cpe:2.3:o:linux:linux_kernel:4.14.33
  • Linux Kernel 4.14.34
    cpe:2.3:o:linux:linux_kernel:4.14.34
  • Linux Kernel 4.14.35
    cpe:2.3:o:linux:linux_kernel:4.14.35
  • Linux Kernel 4.14.36
    cpe:2.3:o:linux:linux_kernel:4.14.36
  • Linux Kernel 4.14.37
    cpe:2.3:o:linux:linux_kernel:4.14.37
  • Linux Kernel 4.14.38
    cpe:2.3:o:linux:linux_kernel:4.14.38
  • Linux Kernel 4.14.39
    cpe:2.3:o:linux:linux_kernel:4.14.39
  • Linux Kernel 4.14.40
    cpe:2.3:o:linux:linux_kernel:4.14.40
  • Linux Kernel 4.14.41
    cpe:2.3:o:linux:linux_kernel:4.14.41
  • Linux Kernel 4.14.42
    cpe:2.3:o:linux:linux_kernel:4.14.42
  • Linux Kernel 4.14.43
    cpe:2.3:o:linux:linux_kernel:4.14.43
  • Linux Kernel 4.14.44
    cpe:2.3:o:linux:linux_kernel:4.14.44
  • Linux Kernel 4.14.45
    cpe:2.3:o:linux:linux_kernel:4.14.45
  • Linux Kernel 4.14.46
    cpe:2.3:o:linux:linux_kernel:4.14.46
  • Linux Kernel 4.14.47
    cpe:2.3:o:linux:linux_kernel:4.14.47
  • Linux Kernel 4.14.48
    cpe:2.3:o:linux:linux_kernel:4.14.48
  • Linux Kernel 4.14.49
    cpe:2.3:o:linux:linux_kernel:4.14.49
  • Linux Kernel 4.14.50
    cpe:2.3:o:linux:linux_kernel:4.14.50
  • Linux Kernel 4.14.51
    cpe:2.3:o:linux:linux_kernel:4.14.51
  • Linux Kernel 4.14.52
    cpe:2.3:o:linux:linux_kernel:4.14.52
  • Linux Kernel 4.14.53
    cpe:2.3:o:linux:linux_kernel:4.14.53
  • Linux Kernel 4.14.54
    cpe:2.3:o:linux:linux_kernel:4.14.54
  • Linux Kernel 4.14.67
    cpe:2.3:o:linux:linux_kernel:4.14.67
  • Linux Kernel 4.15
    cpe:2.3:o:linux:linux_kernel:4.15
  • Linux Kernel 4.15 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.15:rc1
  • Linux Kernel 4.15 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:4.15:rc2
  • Linux Kernel 4.15 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:4.15:rc3
  • Linux Kernel 4.15 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.15:rc4
  • Linux Kernel 4.15.1
    cpe:2.3:o:linux:linux_kernel:4.15.1
  • Linux Kernel 4.15.2
    cpe:2.3:o:linux:linux_kernel:4.15.2
  • Linux Kernel 4.15.3
    cpe:2.3:o:linux:linux_kernel:4.15.3
  • Linux Kernel 4.15.4
    cpe:2.3:o:linux:linux_kernel:4.15.4
  • Linux Kernel 4.15.5
    cpe:2.3:o:linux:linux_kernel:4.15.5
  • Linux Kernel 4.15.6
    cpe:2.3:o:linux:linux_kernel:4.15.6
  • Linux Kernel 4.15.7
    cpe:2.3:o:linux:linux_kernel:4.15.7
  • Linux Kernel 4.15.8
    cpe:2.3:o:linux:linux_kernel:4.15.8
  • Linux Kernel 4.15.9
    cpe:2.3:o:linux:linux_kernel:4.15.9
  • Linux Kernel 4.15.10
    cpe:2.3:o:linux:linux_kernel:4.15.10
  • Linux Kernel 4.15.11
    cpe:2.3:o:linux:linux_kernel:4.15.11
  • Linux Kernel 4.15.12
    cpe:2.3:o:linux:linux_kernel:4.15.12
  • Linux Kernel 4.15.13
    cpe:2.3:o:linux:linux_kernel:4.15.13
  • Linux Kernel 4.15.14
    cpe:2.3:o:linux:linux_kernel:4.15.14
  • Linux Kernel 4.15.15
    cpe:2.3:o:linux:linux_kernel:4.15.15
  • Linux Kernel 4.15.16
    cpe:2.3:o:linux:linux_kernel:4.15.16
  • Linux Kernel 4.15.17
    cpe:2.3:o:linux:linux_kernel:4.15.17
  • Linux Kernel 4.15.18
    cpe:2.3:o:linux:linux_kernel:4.15.18
  • Linux Kernel 4.16
    cpe:2.3:o:linux:linux_kernel:4.16
  • Linux Kernel 4.16 Release Candidate
    cpe:2.3:o:linux:linux_kernel:4.16:rc
  • Linux Kernel 4.16 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.16:rc1
  • Linux Kernel 4.16 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:4.16:rc2
  • Linux Kernel 4.16 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:4.16:rc3
  • Linux Kernel 4.16 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.16:rc4
  • Linux Kernel 4.16 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:4.16:rc5
  • Linux Kernel 4.16 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:4.16:rc6
  • Linux Kernel 4.16 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:4.16:rc7
  • Linux Kernel 4.16.1
    cpe:2.3:o:linux:linux_kernel:4.16.1
  • Linux Kernel 4.16.2
    cpe:2.3:o:linux:linux_kernel:4.16.2
  • Linux Kernel 4.16.3
    cpe:2.3:o:linux:linux_kernel:4.16.3
  • Linux Kernel 4.16.4
    cpe:2.3:o:linux:linux_kernel:4.16.4
  • Linux Kernel 4.16.5
    cpe:2.3:o:linux:linux_kernel:4.16.5
  • Linux Kernel 4.16.6
    cpe:2.3:o:linux:linux_kernel:4.16.6
  • Linux Kernel 4.16.7
    cpe:2.3:o:linux:linux_kernel:4.16.7
  • Linux Kernel 4.16.8
    cpe:2.3:o:linux:linux_kernel:4.16.8
  • Linux Kernel 4.16.9
    cpe:2.3:o:linux:linux_kernel:4.16.9
  • Linux Kernel 4.16.10
    cpe:2.3:o:linux:linux_kernel:4.16.10
  • Linux Kernel 4.16.11
    cpe:2.3:o:linux:linux_kernel:4.16.11
  • Linux Kernel 4.16.12
    cpe:2.3:o:linux:linux_kernel:4.16.12
  • Linux Kernel 4.16.13
    cpe:2.3:o:linux:linux_kernel:4.16.13
  • Linux Kernel 4.16.14
    cpe:2.3:o:linux:linux_kernel:4.16.14
  • Linux Kernel 4.16.15
    cpe:2.3:o:linux:linux_kernel:4.16.15
  • Linux Kernel 4.16.16
    cpe:2.3:o:linux:linux_kernel:4.16.16
  • Linux Kernel 4.16.17
    cpe:2.3:o:linux:linux_kernel:4.16.17
  • Linux Kernel 4.16.18
    cpe:2.3:o:linux:linux_kernel:4.16.18
  • Linux Kernel 4.17
    cpe:2.3:o:linux:linux_kernel:4.17
  • Linux Kernel 4.17 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.17:rc1
  • Linux Kernel 4.17 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:4.17:rc2
  • Linux Kernel 4.17 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:4.17:rc3
  • Linux Kernel 4.17 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.17:rc4
  • Linux Kernel 4.17 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:4.17:rc5
  • Linux Kernel 4.17 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:4.17:rc6
  • Linux Kernel 4.17 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:4.17:rc7
  • Linux Kernel 4.17.1
    cpe:2.3:o:linux:linux_kernel:4.17.1
  • Linux Kernel 4.17.2
    cpe:2.3:o:linux:linux_kernel:4.17.2
  • Linux Kernel 4.17.3
    cpe:2.3:o:linux:linux_kernel:4.17.3
  • Linux Kernel 4.17.4
    cpe:2.3:o:linux:linux_kernel:4.17.4
  • Linux Kernel 4.17.5
    cpe:2.3:o:linux:linux_kernel:4.17.5
  • Linux Kernel 4.17.6
    cpe:2.3:o:linux:linux_kernel:4.17.6
  • Linux Kernel 4.17.7
    cpe:2.3:o:linux:linux_kernel:4.17.7
  • Linux Kernel 4.17.8
    cpe:2.3:o:linux:linux_kernel:4.17.8
  • Linux Kernel 4.17.9
    cpe:2.3:o:linux:linux_kernel:4.17.9
  • Linux Kernel 4.18
    cpe:2.3:o:linux:linux_kernel:4.18
  • Linux Kernel 4.18 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.18:rc1
  • Linux Kernel 4.18 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:4.18:rc2
  • Linux Kernel 4.18 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:4.18:rc3
  • Linux Kernel 4.18 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.18:rc4
  • Linux Kernel 4.18 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:4.18:rc5
  • Linux Kernel 4.18 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:4.18:rc6
  • Linux Kernel 4.18 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:4.18:rc7
  • Linux Kernel 4.18 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:4.18:rc8
  • Linux Kernel 4.18.1
    cpe:2.3:o:linux:linux_kernel:4.18.1
  • Linux Kernel 4.18.2
    cpe:2.3:o:linux:linux_kernel:4.18.2
  • Linux Kernel 4.18.3
    cpe:2.3:o:linux:linux_kernel:4.18.3
  • Linux Kernel 4.18.4
    cpe:2.3:o:linux:linux_kernel:4.18.4
  • Linux Kernel 4.18.5
    cpe:2.3:o:linux:linux_kernel:4.18.5
  • Linux Kernel 4.18.6
    cpe:2.3:o:linux:linux_kernel:4.18.6
  • Linux Kernel 4.18.7
    cpe:2.3:o:linux:linux_kernel:4.18.7
  • Linux Kernel 4.18.8
    cpe:2.3:o:linux:linux_kernel:4.18.8
  • Linux Kernel 4.18.9
    cpe:2.3:o:linux:linux_kernel:4.18.9
  • Linux Kernel 4.18.10
    cpe:2.3:o:linux:linux_kernel:4.18.10
  • Linux Kernel 4.18.11
    cpe:2.3:o:linux:linux_kernel:4.18.11
  • Linux Kernel 4.18.12
    cpe:2.3:o:linux:linux_kernel:4.18.12
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.10
    cpe:2.3:o:canonical:ubuntu_linux:18.10
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux Server 7.6
    cpe:2.3:o:redhat:enterprise_linux_server:7.6
  • Red Hat Enterprise Linux Server Advanced mission critical Update Support (AUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
  • Red Hat Enterprise Linux Server Telecommunications Update Service (TUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
  • Red Hat Virtualization 4.0
    cpe:2.3:o:redhat:virtualization:4.0
CVSS
Base: 7.2
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3832-1.NASL
    description Jann Horn discovered that the procfs file system implementation in the Linux kernel did not properly restrict the ability to inspect the kernel stack of an arbitrary task. A local attacker could use this to expose sensitive information. (CVE-2018-17972) Jann Horn discovered that the mremap() system call in the Linux kernel did not properly flush the TLB when completing, potentially leaving access to a physical page after it has been released to the page allocator. A local attacker could use this to cause a denial of service (system crash), expose sensitive information, or possibly execute arbitrary code. (CVE-2018-18281) It was discovered that the BPF verifier in the Linux kernel did not correctly compute numeric bounds in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-18445) Daniel Dadap discovered that the module loading implementation in the Linux kernel did not properly enforce signed module loading when booted with UEFI Secure Boot in some situations. A local privileged attacker could use this to execute untrusted code in the kernel. (CVE-2018-18653) Jann Horn discovered that the Linux kernel mishandles mapping UID or GID ranges inside nested user namespaces in some situations. A local attacker could use this to bypass access controls on resources outside the namespace. (CVE-2018-18955) Philipp Wendler discovered that the overlayfs implementation in the Linux kernel did not properly verify the directory contents permissions from within a unprivileged user namespace. A local attacker could use this to expose sensitive information (protected file names). (CVE-2018-6559). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 119302
    published 2018-11-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119302
    title Ubuntu 18.10 : linux-aws vulnerabilities (USN-3832-1)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-4304.NASL
    description Description of changes: [4.14.35-1818.5.4.el7uek] - RDS: NULL pointer dereference in rds_atomic_free_op (Mohamed Ghannam) [Orabug: 28020694] {CVE-2018-5333} - x86/speculation: Make enhanced IBRS the default spectre v2 mitigation (Alejandro Jimenez) [Orabug: 28474853] - x86/speculation: Enable enhanced IBRS usage (Alejandro Jimenez) [Orabug: 28474853] - x86/speculation: functions for supporting enhanced IBRS (Alejandro Jimenez) [Orabug: 28474853] - KVM: x86: Expose CLDEMOTE CPU feature to guest VM (Jingqi Liu) [Orabug: 28938290] - x86/cpufeatures: Enumerate cldemote instruction (Fenghua Yu) [Orabug: 28938290] - libiscsi: Fix NULL pointer dereference in iscsi_eh_session_reset (Fred Herard) [Orabug: 28946206] - wil6210: missing length check in wmi_set_ie (Lior David) [Orabug: 28951267] {CVE-2018-5848} - floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (Andy Whitcroft) [Orabug: 28956546] {CVE-2018-7755} {CVE-2018-7755} [4.14.35-1818.5.3.el7uek] - hugetlbfs: use truncate mutex to prevent pmd sharing race (Mike Kravetz) [Orabug: 28896279] - xfs: enhance dinode verifier (Eric Sandeen) [Orabug: 28943579] {CVE-2018-10322} - xfs: move inode fork verifiers to xfs_dinode_verify (Darrick J. Wong) [Orabug: 28943579] {CVE-2018-10322} [4.14.35-1818.5.2.el7uek] - rds: crash at rds_ib_inc_copy_to_user+104 due to NULL ptr reference (Venkat Venkatsubra) [Orabug: 28748049] - kdump/vmcore: support encrypted old memory with SME enabled (Lianbo Jiang) [Orabug: 28796835] - amd_iommu: remap the device table of IOMMU with the memory encryption mask for kdump (Lianbo Jiang) [Orabug: 28796835] - kexec: allocate unencrypted control pages for kdump in case SME is enabled (Lianbo Jiang) [Orabug: 28796835] - x86/ioremap: add a function ioremap_encrypted() to remap kdump old memory (Lianbo Jiang) [Orabug: 28796835] - net/rds: Fix endless RNR situation (Venkat Venkatsubra) [Orabug: 28857013] - Btrfs: fix xattr loss after power failure (Filipe Manana) [Orabug: 28893942] - xen/balloon: Support xend-based toolstack (Boris Ostrovsky) [Orabug: 28901032] - Btrfs: fix file data corruption after cloning a range and fsync (Filipe Manana) [Orabug: 28905635] - xen-blkfront: fix kernel panic with negotiate_mq error path (Manjunath Patil) - cdrom: fix improper type cast, which can leat to information leak. (Young_X) [Orabug: 28929755] {CVE-2018-16658} {CVE-2018-10940} {CVE-2018-18710} - sched/fair: Use a recently used CPU as an idle candidate and the basis for SIS (Mel Gorman) [Orabug: 28940633] - sched/fair: Move select_task_rq_fair() slow-path into its own function (Brendan Jackman) [Orabug: 28940633] - certs: Add Oracle's new X509 cert into .builtin_trusted_keys (Eric Snowberg) [Orabug: 28926200] - net: Allow pernet_operations to be executed in parallel (Kirill Tkhai) [Orabug: 28924205] - net: Move mutex_unlock() in cleanup_net() up (Kirill Tkhai) [Orabug: 28924205] - locking/arch, x86: Add __down_read_killable() (Kirill Tkhai) [Orabug: 28924205] - locking/x86: Use named operands in rwsem.h (Miguel Bernal Marin) [Orabug: 28924205] - locking/rwsem: Add down_read_killable() (Kirill Tkhai) [Orabug: 28924205] - net: Introduce net_sem for protection of pernet_list (Kirill Tkhai) [Orabug: 28924205] - net: Assign net to net_namespace_list in setup_net() (Kirill Tkhai) [Orabug: 28924205] - net: Cleanup in copy_net_ns() (Kirill Tkhai) [Orabug: 28924205] [4.14.35-1818.5.1.el7uek] - Revert 'aarch64: remove duplicate dtb in kernel rpm' (Jack Vogel) [4.14.35-1818.5.0.el7uek] - oracleasm: Implement support for QUERY HANDLE operation (Martin K. Petersen) [Orabug: 28887237] - oracleasm: Honor ASM_IFLAG_FORMAT_NOCHECK flag (Martin K. Petersen) [Orabug: 28887237] - bpf: 32-bit RSH verification must truncate input before the ALU op (Jann Horn) [Orabug: 28861785] {CVE-2018-18445} - aarch64: remove duplicate dtb in kernel rpm (Eric Saint-Etienne) [Orabug: 28672035] - scsi: lpfc: Correct MDS diag and nvmet configuration (James Smart) [Orabug: 28432993] - uek-rpm: Run 'make olddefconfig' to get latest x86 config values (Victor Erminpour) [Orabug: 28845157] - hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:447! (Mike Kravetz) [Orabug: 28886647] - ext4: update i_disksize if direct write past ondisk size (Eryu Guan) [Orabug: 28869428] - ext4: protect i_disksize update by i_data_sem in direct write path (Eryu Guan) [Orabug: 28869428] - config: disable xfs online scrub in uek5 (Darrick J. Wong) [Orabug: 28890254] - scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (Alexander Potapenko) [Orabug: 28884433] {CVE-2018-1000204} - random: fix crng_ready() test (Theodore Ts'o) [Orabug: 28863713] {CVE-2018-1108} {CVE-2018-1108} - proc: do not access cmdline nor environ from file-backed areas (Willy Tarreau) [Orabug: 28863722] {CVE-2018-1120} {CVE-2018-1120} - vhost: correctly check the iova range when waking virtqueue (Jason Wang) [Orabug: 28892623] {CVE-2018-1118} - xfs: don't call xfs_da_shrink_inode with NULL bp (Eric Sandeen) [Orabug: 28893785] {CVE-2018-13094} - ALSA: rawmidi: Change resized buffers atomically (Takashi Iwai) [Orabug: 28893798] {CVE-2018-10902} - mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (Andrea Arcangeli) [Orabug: 28899818]
    last seen 2018-12-14
    modified 2018-12-13
    plugin id 119638
    published 2018-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119638
    title Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2018-4304)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3835-1.NASL
    description Jann Horn discovered that the procfs file system implementation in the Linux kernel did not properly restrict the ability to inspect the kernel stack of an arbitrary task. A local attacker could use this to expose sensitive information. (CVE-2018-17972) Jann Horn discovered that the mremap() system call in the Linux kernel did not properly flush the TLB when completing, potentially leaving access to a physical page after it has been released to the page allocator. A local attacker could use this to cause a denial of service (system crash), expose sensitive information, or possibly execute arbitrary code. (CVE-2018-18281) It was discovered that the BPF verifier in the Linux kernel did not correctly compute numeric bounds in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-18445) Daniel Dadap discovered that the module loading implementation in the Linux kernel did not properly enforce signed module loading when booted with UEFI Secure Boot in some situations. A local privileged attacker could use this to execute untrusted code in the kernel. (CVE-2018-18653) Jann Horn discovered that the Linux kernel mishandles mapping UID or GID ranges inside nested user namespaces in some situations. A local attacker could use this to bypass access controls on resources outside the namespace. (CVE-2018-18955) Philipp Wendler discovered that the overlayfs implementation in the Linux kernel did not properly verify the directory contents permissions from within a unprivileged user namespace. A local attacker could use this to expose sensitive information (protected file names). (CVE-2018-6559). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 119338
    published 2018-12-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119338
    title Ubuntu 18.10 : linux, linux-gcp, linux-kvm, linux-raspi2 vulnerabilities (USN-3835-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3589-1.NASL
    description The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : CVE-2018-18445: A faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372). CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825). CVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831). CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 120151
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120151
    title SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:3589-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3934-1.NASL
    description The SUSE Linux Enterprise 12 SP4 kernel for Azure was updated to receive various security and bugfixes. The following security bugs were fixed : CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751). CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372). CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825). CVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831). CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 119286
    published 2018-11-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119286
    title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3934-1)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3847-1.NASL
    description It was discovered that a race condition existed in the raw MIDI driver for the Linux kernel, leading to a double free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10902) It was discovered that an integer overrun vulnerability existed in the POSIX timers implementation in the Linux kernel. A local attacker could use this to cause a denial of service. (CVE-2018-12896) Noam Rathaus discovered that a use-after-free vulnerability existed in the Infiniband implementation in the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2018-14734) It was discovered that the YUREX USB device driver for the Linux kernel did not properly restrict user space reads or writes. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-16276) It was discovered that the BPF verifier in the Linux kernel did not correctly compute numeric bounds in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-18445) Kanda Motohiro discovered that writing extended attributes to an XFS file system in the Linux kernel in certain situations could cause an error condition to occur. A local attacker could use this to cause a denial of service. (CVE-2018-18690) It was discovered that an integer overflow vulnerability existed in the CDROM driver of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-18710). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-21
    plugin id 119827
    published 2018-12-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119827
    title Ubuntu 18.04 LTS : linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, (USN-3847-1)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3847-2.NASL
    description USN-3847-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu 16.04 LTS. It was discovered that a race condition existed in the raw MIDI driver for the Linux kernel, leading to a double free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10902) It was discovered that an integer overrun vulnerability existed in the POSIX timers implementation in the Linux kernel. A local attacker could use this to cause a denial of service. (CVE-2018-12896) Noam Rathaus discovered that a use-after-free vulnerability existed in the Infiniband implementation in the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2018-14734) It was discovered that the YUREX USB device driver for the Linux kernel did not properly restrict user space reads or writes. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-16276) It was discovered that the BPF verifier in the Linux kernel did not correctly compute numeric bounds in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-18445) Kanda Motohiro discovered that writing extended attributes to an XFS file system in the Linux kernel in certain situations could cause an error condition to occur. A local attacker could use this to cause a denial of service. (CVE-2018-18690) It was discovered that an integer overflow vulnerability existed in the CDROM driver of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-18710). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-21
    plugin id 119828
    published 2018-12-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119828
    title Ubuntu 16.04 LTS : linux-hwe, linux-aws-hwe, linux-azure, linux-gcp vulnerabilities (USN-3847-2)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3847-3.NASL
    description USN-3847-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux kernel for Microsoft Azure Cloud systems for Ubuntu 14.04 LTS. It was discovered that a race condition existed in the raw MIDI driver for the Linux kernel, leading to a double free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10902) It was discovered that an integer overrun vulnerability existed in the POSIX timers implementation in the Linux kernel. A local attacker could use this to cause a denial of service. (CVE-2018-12896) Noam Rathaus discovered that a use-after-free vulnerability existed in the Infiniband implementation in the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2018-14734) It was discovered that the YUREX USB device driver for the Linux kernel did not properly restrict user space reads or writes. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-16276) It was discovered that the BPF verifier in the Linux kernel did not correctly compute numeric bounds in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-18445) Kanda Motohiro discovered that writing extended attributes to an XFS file system in the Linux kernel in certain situations could cause an error condition to occur. A local attacker could use this to cause a denial of service. (CVE-2018-18690) It was discovered that an integer overflow vulnerability existed in the CDROM driver of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-18710). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-21
    plugin id 119829
    published 2018-12-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119829
    title Ubuntu 14.04 LTS : linux-azure vulnerabilities (USN-3847-3)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1342.NASL
    description The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751). - CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372). - CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825). - CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831). - CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674). The following non-security bugs were fixed : - acpi / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510). - aio: fix io_destroy(2) vs. lookup_ioctx() race (git-fixes). - alsa: hda: Add 2 more models to the power_save blacklist (bsc#1051510). - alsa: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510). - alsa: hda - Add quirk for ASUS G751 laptop (bsc#1051510). - alsa: hda - Fix headphone pin config for ASUS G751 (bsc#1051510). - alsa: hda: fix unused variable warning (bsc#1051510). - alsa: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510). - alsa: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510). - apparmor: Check buffer bounds when mapping permissions mask (git-fixes). - ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510). - ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510). - ASoC: rsnd: adg: care clock-frequency size (bsc#1051510). - ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510). - ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510). - ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510). - ASoC: wm8804: Add ACPI support (bsc#1051510). - ath10k: fix kernel panic issue during pci probe (bsc#1051510). - ath10k: fix scan crash due to incorrect length calculation (bsc#1051510). - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510). - batman-adv: Avoid probe ELP information leak (bsc#1051510). - batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510). - batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510). - bdi: Fix another oops in wb_workfn() (bsc#1112746). - bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746). - blkdev_report_zones_ioctl(): Use vmalloc() to allocate large buffers (bsc#1111819). - blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713). - block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708). - block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712). - block: bvec_nr_vecs() returns value for wrong slab (bsc#1111834). - bpf/verifier: disallow pointer subtraction (bsc#1083647). - btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667). - btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667). - btrfs: fix file data corruption after cloning a range and fsync (bsc#1111901). - btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919). - btrfs: fix mount failure after fsync due to hard link recreation (bsc#1103543). - btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915). - btrfs: send, fix invalid access to commit roots due to concurrent snapshotting (bsc#1111904). - cdc-acm: fix race between reset and control messaging (bsc#1051510). - ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983). - cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902). - cifs: fix memory leak in SMB2_open() (bsc#1112894). - cifs: Fix use after free of a mid_q_entry (bsc#1112903). - clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510). - clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510). - clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510). - clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510). - coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510). - crypto: caam - fix implicit casts in endianness helpers (bsc#1051510). - crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510). - crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510). - crypto: tcrypt - fix ghash-generic speed test (bsc#1051510). - dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951). - debugobjects: Make stack check warning more informative (bsc#1051510). - documentation/l1tf: Fix small spelling typo (bsc#1051510). - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510). - drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110) - drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722) - drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510). - drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722) - drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722) - drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722) - drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510). - drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722) - drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510). - drm/i915: Restore vblank interrupts earlier (bsc#1051510). - drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510). - drm/mediatek: fix OF sibling-node lookup (bsc#1106110) - drm/msm: fix OF child-node lookup (bsc#1106110) - drm/nouveau: Do not disable polling in fallback mode (bsc#1103356). - drm/sti: do not remove the drm_bridge that was never added (bsc#1100132) - drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110) - drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722) - e1000: check on netif_running() before calling e1000_up() (bsc#1051510). - e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510). - eeprom: at24: change nvmem stride to 1 (bsc#1051510). - eeprom: at24: check at24_read/write arguments (bsc#1051510). - eeprom: at24: correctly set the size for at24mac402 (bsc#1051510). - enic: do not call enic_change_mtu in enic_probe (bsc#1051510). - enic: handle mtu change for vf properly (bsc#1051510). - enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510). - ethtool: fix a privilege escalation bug (bsc#1076830). - ext2, dax: set ext2_dax_aops for dax files (bsc#1112554). - ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736). - ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735). - ext4: check for NUL characters in extended attribute's name (bsc#1112732). - ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734). - ext4: do not mark mmp buffer head dirty (bsc#1112743). - ext4: fix online resize's handling of a too-small final block group (bsc#1112739). - ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740). - ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733). - ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738). - ext4: reset error code in ext4_find_entry in fallback (bsc#1112731). - ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741). - fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510). - fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745). - hfsplus: do not return 0 when fill_super() failed (bsc#1051510). - hfsplus: stop workqueue when fill_super() failed (bsc#1051510). - hfs: prevent crash on exit from failed search (bsc#1051510). - hid: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510). - hid: quirks: fix support for Apple Magic Keyboards (bsc#1051510). - hid: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510). - hv: avoid crash in vmbus sysfs files (bnc#1108377). - hv_netvsc: fix schedule in RCU context (). - hwrng: core - document the quality field (bsc#1051510). - hypfs_kill_super(): deal with failed allocations (bsc#1051510). - i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510). - i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510). - iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510). - iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510). - iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510). - input: atakbd - fix Atari CapsLock behaviour (bsc#1051510). - input: atakbd - fix Atari keymap (bsc#1051510). - intel_th: pci: Add Ice Lake PCH support (bsc#1051510). - iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237). - iommu/vt-d: Add definitions for PFSID (bsc#1106237). - iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237). - iommu/vt-d: Fix scatterlist offset handling (bsc#1106237). - iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510). - iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510). - iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510). - iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510). - iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510). - iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510). - iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510). - iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510). - jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257). - kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240). - Kbuild: fix # escaping in .cmd files for future Make (git-fixes). - kernfs: update comment about kernfs_path() return value (bsc#1051510). - kprobes/x86: Fix %p uses in error messages (bsc#1110006). - ksm: fix unlocked iteration over vmas in cmp_and_merge_page() (VM Functionality bsc#1111806). - kvm: Make VM ioctl do valloc for some archs (bsc#1111506). - kvm: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240). - kvm: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240). - kvm: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240). - kvm: x86: Add a framework for supporting MSR-based features (bsc#1106240). - kvm: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506). - kvm: X86: Introduce kvm_get_msr_feature() (bsc#1106240). - kvm/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506). - kvm: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240). - libertas: call into generic suspend code before turning off power (bsc#1051510). - libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972). - libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972). - libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972). - lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510). - lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510). - loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711). - loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710). - loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284). - mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510). - mach64: detect the dot clock divider correctly on sparc (bsc#1051510). - media: af9035: prevent buffer overflow on write (bsc#1051510). - media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510). - media: dvb: fix compat ioctl translation (bsc#1051510). - media: em28xx: fix input name for Terratec AV 350 (bsc#1051510). - media: em28xx: use a default format if TRY_FMT fails (bsc#1051510). - media: pci: cx23885: handle adding to list failure (bsc#1051510). - media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510). - media: tvp5150: fix switch exit in set control handler (bsc#1051510). - media: tvp5150: fix width alignment during set_selection() (bsc#1051510). - media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510). - media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510). - media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510). - mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510). - mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510). - mm: fix BUG_ON() in vmf_insert_pfn_pud() from VM_MIXEDMAP removal (bsc#1111841). - mm/migrate: Use spin_trylock() while resetting rate limit (). - mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907). - move changes without Git-commit out of sorted section - nfc: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510). - nfs: Avoid quadratic search when freeing delegations (bsc#1084760). - nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972). - nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972). - nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972). - nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972). - nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972). - of: add helper to lookup compatible child node (bsc#1106110) - orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510). - orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510). - orangefs_kill_sb(): deal with allocation failures (bsc#1051510). - orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510). - ovl: fix format of setxattr debug (git-fixes). - ovl: Sync upper dirty data when syncing overlayfs (git-fixes). - pci/ASPM: Fix link_state teardown on device removal (bsc#1051510). - pci: hv: Do not wait forever on a device that has disappeared (bsc#1109806). - pci: Reprogram bridge prefetch registers on resume (bsc#1051510). - powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800). - powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120). - powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes). - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes). - powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295). - powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295). - powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870). - printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170). - printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208). - proc: restrict kernel stack dumps to root (git-fixes). blacklist.conf : - qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510). - qrtr: add MODULE_ALIAS macro to smd (bsc#1051510). - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510). - random: rate limit unseeded randomness warnings (git-fixes). - rculist: add list_for_each_entry_from_rcu() (bsc#1084760). - rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760). - reiserfs: add check to detect corrupted directory entry (bsc#1109818). - reiserfs: do not panic on bad directory entries (bsc#1109818). - scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246). - scsi: ipr: Eliminate duplicate barriers (). - scsi: ipr: fix incorrect indentation of assignment statement (). - scsi: ipr: Use dma_pool_zalloc() (). - scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731). - scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731). - scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1111830). - scsi: target: prefer dbroot of /etc/target over /var/target (bsc#1111928). - serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510). - series.conf: moved some Xen patches to the sorted region xen/blkfront: correct purging of persistent grants (bnc#1112514). - signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006). - smb2: fix missing files in root share directory listing (bsc#1112907). - smb3: fill in statfs fsid and correct namelen (bsc#1112905). - smb3: fix reset of bytes read and written stats (bsc#1112906). - smb3: on reconnect set PreviousSessionId field (bsc#1112899). - sock_diag: fix use-after-free read in __sk_free (bsc#1051510). - soc/tegra: pmc: Fix child-node lookup (bsc#1051510). - sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510). - sound: enable interrupt after dma buffer initialization (bsc#1051510). - spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510). - spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510). - spi: sh-msiof: fix deferred probing (bsc#1051510). - squashfs: more metadata hardening (bsc#1051510). - staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510). - stm: Potential read overflow in stm_char_policy_set_ioctl() (bsc#1051510). - switchtec: Fix Spectre v1 vulnerability (bsc#1051510). - sysfs: Do not return POSIX ACL xattrs via listxattr (git-fixes). - target: log Data-Out timeouts as errors (bsc#1095805). - target: log NOP ping timeouts as errors (bsc#1095805). - target: split out helper for cxn timeout error stashing (bsc#1095805). - target: stash sess_err_stats on Data-Out timeout (bsc#1095805). - target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805). - team: Forbid enslaving team device to itself (bsc#1051510). - tools build: fix # escaping in .cmd files for future Make (git-fixes). - tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510). - tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510). - tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219). - tty: fix data race between tty_init_dev and flush of buf (bnc#1105428). - tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428). - tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428). - tty/ldsem: Convert to regular lockdep annotations (bnc#1105428). - tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428). - tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428). - tty: Simplify tty->count math in tty_reopen() (bnc#1105428). - usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510). - usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bsc#1051510). - usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510). - usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510). - usbip: tools: fix atoi() on non-null terminated string (bsc#1051510). - usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510). - usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510). - usb: serial: simple: add Motorola Tetra MTP6550 id (bsc#1051510). - usb: xhci-mtk: resume USB3 roothub first (bsc#1051510). - usb: yurex: Check for truncation in yurex_read() (bsc#1051510). - userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739). - Use upstream version of pci-hyperv patch (35a88a1) - vmbus: do not return values for uninitalized channels (bsc#1051510). - vti4: Do not count header length twice on tunnel setup (bsc#1051510). - vti6: fix PMTU caching and reporting on xmit (bsc#1051510). - vti6: remove !skb->ignore_df check from vti6_xmit() (bsc#1051510). - Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040). - x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006). - x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878). - x86/boot: Move EISA setup to a separate file (bsc#1110006). - x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006). - x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006). - x86/eisa: Add missing include (bsc#1110006). - x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006). - x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006). - x86/kasan: Panic if there is not enough memory to boot (bsc#1110006). - x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006). - x86/paravirt: Fix some warning messages (bnc#1065600). - x86/percpu: Fix this_cpu_read() (bsc#1110006). - x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bsc#1105536). - x86/time: Correct the attribute on jiffies' definition (bsc#1110006). - xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600). - xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600). - xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600). - xfrm: use complete IPv6 addresses for hash (bsc#1109330). - xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025). - xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bsc#1051510). - xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 118818
    published 2018-11-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118818
    title openSUSE Security Update : the Linux Kernel (openSUSE-2018-1342)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4069-1.NASL
    description The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152). CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removed entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry could remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769). CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751). CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372). CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825). CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831). CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-13
    plugin id 119647
    published 2018-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119647
    title SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:4069-1)
redhat via4
advisories
  • bugzilla
    id 1655904
    title CVE-2018-9568 kernel: Memory corruption due to incorrect socket cloning
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    • OR
      • AND
        • comment bpftool is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512035
        • comment bpftool is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20183083036
      • AND
        • comment kernel is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512019
        • comment kernel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842006
      • AND
        • comment kernel-abi-whitelists is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512005
        • comment kernel-abi-whitelists is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20131645028
      • AND
        • comment kernel-bootwrapper is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512027
        • comment kernel-bootwrapper is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842010
      • AND
        • comment kernel-debug is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512021
        • comment kernel-debug is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842012
      • AND
        • comment kernel-debug-devel is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512009
        • comment kernel-debug-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842014
      • AND
        • comment kernel-devel is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512017
        • comment kernel-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842016
      • AND
        • comment kernel-doc is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512007
        • comment kernel-doc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842024
      • AND
        • comment kernel-headers is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512023
        • comment kernel-headers is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842008
      • AND
        • comment kernel-kdump is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512015
        • comment kernel-kdump is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842018
      • AND
        • comment kernel-kdump-devel is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512013
        • comment kernel-kdump-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842020
      • AND
        • comment kernel-tools is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512029
        • comment kernel-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20140678010
      • AND
        • comment kernel-tools-libs is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512033
        • comment kernel-tools-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20140678012
      • AND
        • comment kernel-tools-libs-devel is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512031
        • comment kernel-tools-libs-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20140678020
      • AND
        • comment perf is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512025
        • comment perf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842022
      • AND
        • comment python-perf is earlier than 0:3.10.0-957.10.1.el7
          oval oval:com.redhat.rhsa:tst:20190512011
        • comment python-perf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111530020
    rhsa
    id RHSA-2019:0512
    released 2019-03-13
    severity Important
    title RHSA-2019:0512: kernel security, bug fix, and enhancement update (Important)
  • bugzilla
    id 1672406
    title kernel-rt: update to the RHEL7.6.z batch#3 source tree
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    • OR
      • AND
        • comment kernel-rt is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514011
        • comment kernel-rt is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727006
      • AND
        • comment kernel-rt-debug is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514019
        • comment kernel-rt-debug is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727014
      • AND
        • comment kernel-rt-debug-devel is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514013
        • comment kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727016
      • AND
        • comment kernel-rt-debug-kvm is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514007
        • comment kernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161051024
      • AND
        • comment kernel-rt-devel is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514023
        • comment kernel-rt-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727012
      • AND
        • comment kernel-rt-doc is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514005
        • comment kernel-rt-doc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727018
      • AND
        • comment kernel-rt-kvm is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514009
        • comment kernel-rt-kvm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161051016
      • AND
        • comment kernel-rt-trace is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514021
        • comment kernel-rt-trace is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727008
      • AND
        • comment kernel-rt-trace-devel is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514017
        • comment kernel-rt-trace-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727010
      • AND
        • comment kernel-rt-trace-kvm is earlier than 0:3.10.0-957.10.1.rt56.921.el7
          oval oval:com.redhat.rhsa:tst:20190514015
        • comment kernel-rt-trace-kvm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161051018
    rhsa
    id RHSA-2019:0514
    released 2019-03-12
    severity Important
    title RHSA-2019:0514: kernel-rt security and bug fix update (Important)
rpms
  • bpftool-0:3.10.0-957.10.1.el7
  • kernel-0:3.10.0-957.10.1.el7
  • kernel-abi-whitelists-0:3.10.0-957.10.1.el7
  • kernel-bootwrapper-0:3.10.0-957.10.1.el7
  • kernel-debug-0:3.10.0-957.10.1.el7
  • kernel-debug-devel-0:3.10.0-957.10.1.el7
  • kernel-devel-0:3.10.0-957.10.1.el7
  • kernel-doc-0:3.10.0-957.10.1.el7
  • kernel-headers-0:3.10.0-957.10.1.el7
  • kernel-kdump-0:3.10.0-957.10.1.el7
  • kernel-kdump-devel-0:3.10.0-957.10.1.el7
  • kernel-tools-0:3.10.0-957.10.1.el7
  • kernel-tools-libs-0:3.10.0-957.10.1.el7
  • kernel-tools-libs-devel-0:3.10.0-957.10.1.el7
  • perf-0:3.10.0-957.10.1.el7
  • python-perf-0:3.10.0-957.10.1.el7
  • kernel-rt-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-debug-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-debug-devel-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-debug-kvm-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-doc-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-kvm-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-trace-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-trace-devel-0:3.10.0-957.10.1.rt56.921.el7
  • kernel-rt-trace-kvm-0:3.10.0-957.10.1.rt56.921.el7
refmap via4
confirm https://support.f5.com/csp/article/K38456756
misc
ubuntu
  • USN-3832-1
  • USN-3835-1
  • USN-3847-1
  • USN-3847-2
  • USN-3847-3
Last major update 17-10-2018 - 15:29
Published 17-10-2018 - 15:29
Last modified 08-04-2019 - 21:29
Back to Top