Описание
ELSA-2013-0621: kernel security update (IMPORTANT)
kernel [2.6.18-348.3.1]
- [utrace] ensure arch_ptrace() can never race with SIGKILL (Oleg Nesterov) [912071 912072] {CVE-2013-0871}
- [x86] msr: Add capabilities check (Nikola Pajkovsky) [908696 908697] {CVE-2013-0268}
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-348.3.1.el5
kernel-debug
2.6.18-348.3.1.el5
kernel-debug-devel
2.6.18-348.3.1.el5
kernel-devel
2.6.18-348.3.1.el5
kernel-doc
2.6.18-348.3.1.el5
kernel-headers
2.6.18-348.3.1.el5
kernel-xen
2.6.18-348.3.1.el5
kernel-xen-devel
2.6.18-348.3.1.el5
ocfs2-2.6.18-348.3.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.3.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.3.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.3.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.3.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.3.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-348.3.1.el5
kernel-debug
2.6.18-348.3.1.el5
kernel-debug-devel
2.6.18-348.3.1.el5
kernel-devel
2.6.18-348.3.1.el5
kernel-doc
2.6.18-348.3.1.el5
kernel-headers
2.6.18-348.3.1.el5
kernel-xen
2.6.18-348.3.1.el5
kernel-xen-devel
2.6.18-348.3.1.el5
ocfs2-2.6.18-348.3.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.3.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.3.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.3.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.3.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.3.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-348.3.1.el5
kernel-PAE
2.6.18-348.3.1.el5
kernel-PAE-devel
2.6.18-348.3.1.el5
kernel-debug
2.6.18-348.3.1.el5
kernel-debug-devel
2.6.18-348.3.1.el5
kernel-devel
2.6.18-348.3.1.el5
kernel-doc
2.6.18-348.3.1.el5
kernel-headers
2.6.18-348.3.1.el5
kernel-xen
2.6.18-348.3.1.el5
kernel-xen-devel
2.6.18-348.3.1.el5
ocfs2-2.6.18-348.3.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.3.1.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-348.3.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.3.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.3.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.3.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-348.3.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.3.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
The msr_open function in arch/x86/kernel/msr.c in the Linux kernel bef ...