[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2018:1319-01 -- Redhat kernel, perf

ID: oval:org.secpod.oval:def:502286Date: (C)2018-05-11   (M)2024-02-19
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * hw: cpu: speculative execution permission faults handling * Kernel: error in exception handling leads to DoS * kernel: nfsd: Incorrect handling of long RPC replies * kernel: Use-after-free vulnerability in DCCP socket * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c * kernel: Stack information leak in the EFS element For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section. Red Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410. Bug Fix: These updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431591

Platform:
Red Hat Enterprise Linux 6
Product:
kernel
perf
Reference:
RHSA-2018:1319-01
CVE-2017-7645
CVE-2017-8824
CVE-2017-13166
CVE-2017-18017
CVE-2017-1000410
CVE-2018-8897
CVE    6
CVE-2017-1000410
CVE-2017-13166
CVE-2017-18017
CVE-2017-7645
...
CPE    905
cpe:/o:linux:linux_kernel:3.4.82
cpe:/o:linux:linux_kernel:3.4.81
cpe:/o:linux:linux_kernel:3.4.80
cpe:/o:linux:linux_kernel:3.4.86
...

© SecPod Technologies