Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1959

Опубликовано: 05 дек. 2014
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2014-1959: kernel security and bug fix update (MODERATE)

kernel [2.6.18-400]

  • [net] bridge: disable snooping if there is no querier (Frantisek Hrbata) [902454]
  • [s390] kernel: sysinfo: convert /proc/sysinfo to seqfile (Alexander Gordeev) [1131283]
  • [net] netlink: verify permisions of socket creator (Jiri Benc) [1094266] {CVE-2014-0181}
  • [net] netlink: store effective caps at socket() time (Jiri Benc) [1094266] {CVE-2014-0181}
  • [net] netlink: Rename netlink_capable netlink_allowed (Jiri Benc) [1094266] {CVE-2014-0181}
  • [net] netlink: Fix permission check in netlink_connect() (Jiri Benc) [1094266] {CVE-2014-0181}
  • [net] netlink: fix possible spoofing from non-root processes (Jiri Benc) [1094266] {CVE-2014-0181}
  • [net] netlink: Make NETLINK_USERSOCK work again (Jiri Benc) [1094266] {CVE-2014-0181}
  • [net] netlink: fix for too early rmmod (Jiri Benc) [1094266] {CVE-2014-0181}

[2.6.18-399]

  • [kernel] do_setitimer: cancel real_timer if try_to_cancel fails (Oleg Nesterov) [1134654]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-400.el5

kernel-debug

2.6.18-400.el5

kernel-debug-devel

2.6.18-400.el5

kernel-devel

2.6.18-400.el5

kernel-doc

2.6.18-400.el5

kernel-headers

2.6.18-400.el5

kernel-xen

2.6.18-400.el5

kernel-xen-devel

2.6.18-400.el5

ocfs2-2.6.18-400.el5

1.4.10-1.el5

ocfs2-2.6.18-400.el5debug

1.4.10-1.el5

ocfs2-2.6.18-400.el5xen

1.4.10-1.el5

oracleasm-2.6.18-400.el5

2.0.5-1.el5

oracleasm-2.6.18-400.el5debug

2.0.5-1.el5

oracleasm-2.6.18-400.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-400.el5

kernel-debug

2.6.18-400.el5

kernel-debug-devel

2.6.18-400.el5

kernel-devel

2.6.18-400.el5

kernel-doc

2.6.18-400.el5

kernel-headers

2.6.18-400.el5

kernel-xen

2.6.18-400.el5

kernel-xen-devel

2.6.18-400.el5

ocfs2-2.6.18-400.el5

1.4.10-1.el5

ocfs2-2.6.18-400.el5debug

1.4.10-1.el5

ocfs2-2.6.18-400.el5xen

1.4.10-1.el5

oracleasm-2.6.18-400.el5

2.0.5-1.el5

oracleasm-2.6.18-400.el5debug

2.0.5-1.el5

oracleasm-2.6.18-400.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-400.el5

kernel-PAE

2.6.18-400.el5

kernel-PAE-devel

2.6.18-400.el5

kernel-debug

2.6.18-400.el5

kernel-debug-devel

2.6.18-400.el5

kernel-devel

2.6.18-400.el5

kernel-doc

2.6.18-400.el5

kernel-headers

2.6.18-400.el5

kernel-xen

2.6.18-400.el5

kernel-xen-devel

2.6.18-400.el5

ocfs2-2.6.18-400.el5

1.4.10-1.el5

ocfs2-2.6.18-400.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-400.el5debug

1.4.10-1.el5

ocfs2-2.6.18-400.el5xen

1.4.10-1.el5

oracleasm-2.6.18-400.el5

2.0.5-1.el5

oracleasm-2.6.18-400.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-400.el5debug

2.0.5-1.el5

oracleasm-2.6.18-400.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
около 11 лет назад

The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.

redhat
около 11 лет назад

The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.

nvd
около 11 лет назад

The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.

debian
около 11 лет назад

The Netlink implementation in the Linux kernel through 3.14.1 does not ...

github
около 3 лет назад

The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.

Уязвимость ELSA-2014-1959