Описание
ELSA-2014-1959: kernel security and bug fix update (MODERATE)
kernel [2.6.18-400]
- [net] bridge: disable snooping if there is no querier (Frantisek Hrbata) [902454]
- [s390] kernel: sysinfo: convert /proc/sysinfo to seqfile (Alexander Gordeev) [1131283]
- [net] netlink: verify permisions of socket creator (Jiri Benc) [1094266] {CVE-2014-0181}
- [net] netlink: store effective caps at socket() time (Jiri Benc) [1094266] {CVE-2014-0181}
- [net] netlink: Rename netlink_capable netlink_allowed (Jiri Benc) [1094266] {CVE-2014-0181}
- [net] netlink: Fix permission check in netlink_connect() (Jiri Benc) [1094266] {CVE-2014-0181}
- [net] netlink: fix possible spoofing from non-root processes (Jiri Benc) [1094266] {CVE-2014-0181}
- [net] netlink: Make NETLINK_USERSOCK work again (Jiri Benc) [1094266] {CVE-2014-0181}
- [net] netlink: fix for too early rmmod (Jiri Benc) [1094266] {CVE-2014-0181}
[2.6.18-399]
- [kernel] do_setitimer: cancel real_timer if try_to_cancel fails (Oleg Nesterov) [1134654]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-400.el5
kernel-debug
2.6.18-400.el5
kernel-debug-devel
2.6.18-400.el5
kernel-devel
2.6.18-400.el5
kernel-doc
2.6.18-400.el5
kernel-headers
2.6.18-400.el5
kernel-xen
2.6.18-400.el5
kernel-xen-devel
2.6.18-400.el5
ocfs2-2.6.18-400.el5
1.4.10-1.el5
ocfs2-2.6.18-400.el5debug
1.4.10-1.el5
ocfs2-2.6.18-400.el5xen
1.4.10-1.el5
oracleasm-2.6.18-400.el5
2.0.5-1.el5
oracleasm-2.6.18-400.el5debug
2.0.5-1.el5
oracleasm-2.6.18-400.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-400.el5
kernel-debug
2.6.18-400.el5
kernel-debug-devel
2.6.18-400.el5
kernel-devel
2.6.18-400.el5
kernel-doc
2.6.18-400.el5
kernel-headers
2.6.18-400.el5
kernel-xen
2.6.18-400.el5
kernel-xen-devel
2.6.18-400.el5
ocfs2-2.6.18-400.el5
1.4.10-1.el5
ocfs2-2.6.18-400.el5debug
1.4.10-1.el5
ocfs2-2.6.18-400.el5xen
1.4.10-1.el5
oracleasm-2.6.18-400.el5
2.0.5-1.el5
oracleasm-2.6.18-400.el5debug
2.0.5-1.el5
oracleasm-2.6.18-400.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-400.el5
kernel-PAE
2.6.18-400.el5
kernel-PAE-devel
2.6.18-400.el5
kernel-debug
2.6.18-400.el5
kernel-debug-devel
2.6.18-400.el5
kernel-devel
2.6.18-400.el5
kernel-doc
2.6.18-400.el5
kernel-headers
2.6.18-400.el5
kernel-xen
2.6.18-400.el5
kernel-xen-devel
2.6.18-400.el5
ocfs2-2.6.18-400.el5
1.4.10-1.el5
ocfs2-2.6.18-400.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-400.el5debug
1.4.10-1.el5
ocfs2-2.6.18-400.el5xen
1.4.10-1.el5
oracleasm-2.6.18-400.el5
2.0.5-1.el5
oracleasm-2.6.18-400.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-400.el5debug
2.0.5-1.el5
oracleasm-2.6.18-400.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
The Netlink implementation in the Linux kernel through 3.14.1 does not ...
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.