ELSA-2019-4576

ELSA-2019-4576 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2019-03-12

Description


kernel-uek
[3.8.13-118.31.1]
- alarmtimer: Prevent overflow for relative nanosleep (Thomas Gleixner) [Orabug: 29269167] {CVE-2018-13053}
- KEYS: Don't permit request_key() to construct a new keyring (David Howells) [Orabug: 29304552] {CVE-2017-17807}
- KEYS: add missing permission check for request_key() destination (Eric Biggers) [Orabug: 29304552] {CVE-2017-17807}
- ext4: only look at the bg_flags field if it is valid (Theodore Ts'o) [Orabug: 29409425] {CVE-2018-10876} {CVE-2018-10876}
- net: Set sk_prot_creator when cloning sockets to the right proto (Christoph Paasch) [Orabug: 29422740] {CVE-2018-9568}
- ext4: make sure bitmaps and the inode table don't overlap with bg descriptors (Theodore Ts'o) [Orabug: 29428608] {CVE-2018-10878}
- ext4: always check block group bounds in ext4_init_block_bitmap() (Theodore Ts'o) [Orabug: 29428608] {CVE-2018-10878}


Related CVEs


CVE-2018-10878
CVE-2018-13053
CVE-2017-17807
CVE-2018-10876
CVE-2018-9568

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) dtrace-modules-3.8.13-118.31.1.el6uek-0.4.5-3.el6.src.rpmea03288336ac65dfd9a18deae146efaf-
kernel-uek-3.8.13-118.31.1.el6uek.src.rpma267d7e2b2b13e1f94be45c9520a9adc-
dtrace-modules-3.8.13-118.31.1.el6uek-0.4.5-3.el6.x86_64.rpm9f05b54235fefe60443126f9f102e4a5-
kernel-uek-3.8.13-118.31.1.el6uek.x86_64.rpmad5d3dbfac82491ce7c69a52089eed3c-
kernel-uek-debug-3.8.13-118.31.1.el6uek.x86_64.rpm079ce57489afc159807587ba8b6d48a9-
kernel-uek-debug-devel-3.8.13-118.31.1.el6uek.x86_64.rpme60d3b49e20c240a6544450e30632522-
kernel-uek-devel-3.8.13-118.31.1.el6uek.x86_64.rpm92c2f5f4c178e746165ea9b1e77d133c-
kernel-uek-doc-3.8.13-118.31.1.el6uek.noarch.rpme3fe222877025bfae658261ccb1eb541-
kernel-uek-firmware-3.8.13-118.31.1.el6uek.noarch.rpmabfa7bf9ad2d42c6ef8f8e4cbb9a6b9e-
Oracle Linux 7 (x86_64) dtrace-modules-3.8.13-118.31.1.el7uek-0.4.5-3.el7.src.rpm9d2c86721fe8196525a743fb3e8040d9-
kernel-uek-3.8.13-118.31.1.el7uek.src.rpm0d832175ffc6105b2d9fd9e5bd1f0cfa-
dtrace-modules-3.8.13-118.31.1.el7uek-0.4.5-3.el7.x86_64.rpmd78778ddac0ca202d948fbee49e09eeb-
kernel-uek-3.8.13-118.31.1.el7uek.x86_64.rpm24622912e13b8e80a289c71b9ee86b07-
kernel-uek-debug-3.8.13-118.31.1.el7uek.x86_64.rpmf96456fd4fffd688c40f07108473b771-
kernel-uek-debug-devel-3.8.13-118.31.1.el7uek.x86_64.rpm7ae656526330a7fff0ef46105fda144a-
kernel-uek-devel-3.8.13-118.31.1.el7uek.x86_64.rpm419f4a9b9c8ae0bc072934d4808ad8c4-
kernel-uek-doc-3.8.13-118.31.1.el7uek.noarch.rpm2187754f596b75d66b41698d002dcc6d-
kernel-uek-firmware-3.8.13-118.31.1.el7uek.noarch.rpm548d0e8abc53ad6731635928aef70321-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete