ALT-PU-2018-1473-1
Package kernel-image-un-def updated to version 4.14.29-alt0.M80P.1 for branch p8 in task 202699.
Closed vulnerabilities
BDU:2018-00414
Уязвимость функций snd_seq_write и snd_seq_ioctl_set_client_pool (seq_clientmgr.c) звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00604
Уязвимость интерфейса системных вызовов (SCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2018-1000004
In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
- [oss-security] 20180116 sound driver Conditional competition
- [oss-security] 20180116 sound driver Conditional competition
- 104606
- 104606
- RHSA-2018:0654
- RHSA-2018:0654
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:2390
- RHSA-2018:2390
- RHSA-2019:1483
- RHSA-2019:1483
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3631-1
- USN-3631-1
- USN-3631-2
- USN-3631-2
- USN-3798-1
- USN-3798-1
- USN-3798-2
- USN-3798-2
- DSA-4187
- DSA-4187
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2018-1068
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
- 103459
- 103459
- RHSA-2018:1318
- RHSA-2018:1318
- RHSA-2018:1355
- RHSA-2018:1355
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2019:1170
- RHSA-2019:1170
- RHSA-2019:1190
- RHSA-2019:1190
- RHSA-2019:4159
- RHSA-2019:4159
- https://bugzilla.redhat.com/show_bug.cgi?id=1552048
- https://bugzilla.redhat.com/show_bug.cgi?id=1552048
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
- https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6
- https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [linux-netdev] 20180305 BUG: unable to handle kernel paging request in compat_copy_entries
- [linux-netdev] 20180305 BUG: unable to handle kernel paging request in compat_copy_entries
- [linux-netdev] 20180305 [PATCH net] netfilter: check for out-of-bounds while copying compat entries
- [linux-netdev] 20180305 [PATCH net] netfilter: check for out-of-bounds while copying compat entries
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3656-1
- USN-3656-1
- USN-3674-1
- USN-3674-1
- USN-3674-2
- USN-3674-2
- USN-3677-1
- USN-3677-1
- USN-3677-2
- USN-3677-2
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2018-5803
In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
- RHSA-2018:1854
- RHSA-2018:1854
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- RHSA-2019:0641
- RHSA-2019:0641
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- 81331
- 81331
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3656-1
- USN-3656-1
- USN-3697-1
- USN-3697-1
- USN-3697-2
- USN-3697-2
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- DSA-4187
- DSA-4187
- DSA-4188
- DSA-4188
- [linux-sctp] 20180209 skb_over_panic on INIT/INIT_ACK packet sending
- [linux-sctp] 20180209 skb_over_panic on INIT/INIT_ACK packet sending
- [netdev] 20180207 [Secunia Research] Linux Kernel Vulnerability - Sending information
- [netdev] 20180207 [Secunia Research] Linux Kernel Vulnerability - Sending information