Lucene search

K
oraclelinux
OracleLinuxELSA-2019-4600
HistoryApr 08, 2019 - 12:00 a.m.

Unbreakable Enterprise kernel security update

2019-04-0800:00:00
linux.oracle.com
70

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

30.5%

kernel-uek
[3.8.13-118.32.1]

  • x86/fpu: Factor out memset(xstate, 0) in fpu_finit() paths (Oleg Nesterov) [Orabug: 29012034]
  • x86/fpu: Always allow FPU in interrupt if use_eager_fpu() (Oleg Nesterov) [Orabug: 29012034]
  • x86/fpu: Fix 32-bit signal frame handling (Dave Hansen) [Orabug: 29012034]
  • x86/fpu: Don’t do __thread_fpu_end() if use_eager_fpu() (Oleg Nesterov) [Orabug: 29012034]
  • x86/fpu: Don’t reset fpu_counter (Oleg Nesterov) [Orabug: 29012034]
  • x86, fpu: Fix math_state_restore() race with kernel_fpu_begin() (Oleg Nesterov) [Orabug: 29012034]
  • x86, fpu: Introduce per-cpu in_kernel_fpu state (Oleg Nesterov) [Orabug: 29012034]
  • x86, fpu: Don’t abuse has_fpu in __kernel_fpu_begin/end() (Oleg Nesterov) [Orabug: 29012034]
  • x86: Allow FPU to be used at interrupt time even with eagerfpu (Pekka Riikonen) [Orabug: 29012034]
  • can: gw: ensure DLC boundaries after CAN frame modification (Oliver Hartkopp) [Orabug: 29215300] {CVE-2019-3701} {CVE-2019-3701}
  • ext4: verify the depth of extent tree in ext4_find_extent() (Theodore Ts’o) [Orabug: 29396713] {CVE-2018-10877} {CVE-2018-10877}
  • ext4: always verify the magic number in xattr blocks (Theodore Ts’o) [Orabug: 29437128] {CVE-2018-10879} {CVE-2018-10879}
  • ext4: add corruption check in ext4_xattr_set_entry() (Theodore Ts’o) [Orabug: 29437128] {CVE-2018-10879} {CVE-2018-10879}
  • ext4: clear i_data in ext4_inode_info when removing inline data (Theodore Ts’o) [Orabug: 29540710] {CVE-2018-10881} {CVE-2018-10881}
  • ext4: add more inode number paranoia checks (Theodore Ts’o) [Orabug: 29545567] {CVE-2018-10882} {CVE-2018-10882}
Use Vulners API to create your own security tool

API usage cases
  • Network scanning
  • Linux Patch management
  • Threat protection
  • No network audit solution

Ways of integration

Integrate Vulners API

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

30.5%

Related for ELSA-2019-4600