Lucene search

K
oraclelinuxOracleLinuxELSA-2019-4600
HistoryApr 08, 2019 - 12:00 a.m.

Unbreakable Enterprise kernel security update

2019-04-0800:00:00
linux.oracle.com
74

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

30.5%

kernel-uek
[3.8.13-118.32.1]

  • x86/fpu: Factor out memset(xstate, 0) in fpu_finit() paths (Oleg Nesterov) [Orabug: 29012034]
  • x86/fpu: Always allow FPU in interrupt if use_eager_fpu() (Oleg Nesterov) [Orabug: 29012034]
  • x86/fpu: Fix 32-bit signal frame handling (Dave Hansen) [Orabug: 29012034]
  • x86/fpu: Don’t do __thread_fpu_end() if use_eager_fpu() (Oleg Nesterov) [Orabug: 29012034]
  • x86/fpu: Don’t reset fpu_counter (Oleg Nesterov) [Orabug: 29012034]
  • x86, fpu: Fix math_state_restore() race with kernel_fpu_begin() (Oleg Nesterov) [Orabug: 29012034]
  • x86, fpu: Introduce per-cpu in_kernel_fpu state (Oleg Nesterov) [Orabug: 29012034]
  • x86, fpu: Don’t abuse has_fpu in __kernel_fpu_begin/end() (Oleg Nesterov) [Orabug: 29012034]
  • x86: Allow FPU to be used at interrupt time even with eagerfpu (Pekka Riikonen) [Orabug: 29012034]
  • can: gw: ensure DLC boundaries after CAN frame modification (Oliver Hartkopp) [Orabug: 29215300] {CVE-2019-3701} {CVE-2019-3701}
  • ext4: verify the depth of extent tree in ext4_find_extent() (Theodore Ts’o) [Orabug: 29396713] {CVE-2018-10877} {CVE-2018-10877}
  • ext4: always verify the magic number in xattr blocks (Theodore Ts’o) [Orabug: 29437128] {CVE-2018-10879} {CVE-2018-10879}
  • ext4: add corruption check in ext4_xattr_set_entry() (Theodore Ts’o) [Orabug: 29437128] {CVE-2018-10879} {CVE-2018-10879}
  • ext4: clear i_data in ext4_inode_info when removing inline data (Theodore Ts’o) [Orabug: 29540710] {CVE-2018-10881} {CVE-2018-10881}
  • ext4: add more inode number paranoia checks (Theodore Ts’o) [Orabug: 29545567] {CVE-2018-10882} {CVE-2018-10882}

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

30.5%