ALT-PU-2018-1453-1
Package kernel-image-un-def updated to version 4.14.28-alt1 for branch sisyphus in task 202482.
Closed vulnerabilities
BDU:2018-00414
Уязвимость функций snd_seq_write и snd_seq_ioctl_set_client_pool (seq_clientmgr.c) звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00604
Уязвимость интерфейса системных вызовов (SCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2018-1000004
In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
- http://seclists.org/oss-sec/2018/q1/51
- http://www.securityfocus.com/bid/104606
- https://access.redhat.com/errata/RHSA-2018:0654
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:2390
- https://access.redhat.com/errata/RHSA-2019:1483
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://usn.ubuntu.com/3631-1/
- https://usn.ubuntu.com/3631-2/
- https://usn.ubuntu.com/3798-1/
- https://usn.ubuntu.com/3798-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://seclists.org/oss-sec/2018/q1/51
- http://www.securityfocus.com/bid/104606
- https://access.redhat.com/errata/RHSA-2018:0654
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:2390
- https://access.redhat.com/errata/RHSA-2019:1483
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://usn.ubuntu.com/3631-1/
- https://usn.ubuntu.com/3631-2/
- https://usn.ubuntu.com/3798-1/
- https://usn.ubuntu.com/3798-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2018-1068
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
- http://www.securityfocus.com/bid/103459
- https://access.redhat.com/errata/RHSA-2018:1318
- https://access.redhat.com/errata/RHSA-2018:1355
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2019:1170
- https://access.redhat.com/errata/RHSA-2019:1190
- https://access.redhat.com/errata/RHSA-2019:4159
- https://bugzilla.redhat.com/show_bug.cgi?id=1552048
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
- https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://marc.info/?l=linux-netdev&m=152023808817590&w=2
- https://marc.info/?l=linux-netdev&m=152025888924151&w=2
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3674-1/
- https://usn.ubuntu.com/3674-2/
- https://usn.ubuntu.com/3677-1/
- https://usn.ubuntu.com/3677-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.debian.org/security/2018/dsa-4188
- http://www.securityfocus.com/bid/103459
- https://access.redhat.com/errata/RHSA-2018:1318
- https://access.redhat.com/errata/RHSA-2018:1355
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2019:1170
- https://access.redhat.com/errata/RHSA-2019:1190
- https://access.redhat.com/errata/RHSA-2019:4159
- https://bugzilla.redhat.com/show_bug.cgi?id=1552048
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
- https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://marc.info/?l=linux-netdev&m=152023808817590&w=2
- https://marc.info/?l=linux-netdev&m=152025888924151&w=2
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3674-1/
- https://usn.ubuntu.com/3674-2/
- https://usn.ubuntu.com/3677-1/
- https://usn.ubuntu.com/3677-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.debian.org/security/2018/dsa-4188