Описание
ELSA-2014-2008: kernel security update (IMPORTANT)
kernel [2.6.18-400.1.1]
- [x86] traps: stop using IST for #SS (Petr Matousek) [1172809] {CVE-2014-9322}
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-400.1.1.el5
kernel-debug
2.6.18-400.1.1.el5
kernel-debug-devel
2.6.18-400.1.1.el5
kernel-devel
2.6.18-400.1.1.el5
kernel-doc
2.6.18-400.1.1.el5
kernel-headers
2.6.18-400.1.1.el5
kernel-xen
2.6.18-400.1.1.el5
kernel-xen-devel
2.6.18-400.1.1.el5
ocfs2-2.6.18-400.1.1.el5
1.4.10-1.el5
ocfs2-2.6.18-400.1.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-400.1.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-400.1.1.el5
2.0.5-1.el5
oracleasm-2.6.18-400.1.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-400.1.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-400.1.1.el5
kernel-debug
2.6.18-400.1.1.el5
kernel-debug-devel
2.6.18-400.1.1.el5
kernel-devel
2.6.18-400.1.1.el5
kernel-doc
2.6.18-400.1.1.el5
kernel-headers
2.6.18-400.1.1.el5
kernel-xen
2.6.18-400.1.1.el5
kernel-xen-devel
2.6.18-400.1.1.el5
ocfs2-2.6.18-400.1.1.el5
1.4.10-1.el5
ocfs2-2.6.18-400.1.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-400.1.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-400.1.1.el5
2.0.5-1.el5
oracleasm-2.6.18-400.1.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-400.1.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-400.1.1.el5
kernel-PAE
2.6.18-400.1.1.el5
kernel-PAE-devel
2.6.18-400.1.1.el5
kernel-debug
2.6.18-400.1.1.el5
kernel-debug-devel
2.6.18-400.1.1.el5
kernel-devel
2.6.18-400.1.1.el5
kernel-doc
2.6.18-400.1.1.el5
kernel-headers
2.6.18-400.1.1.el5
kernel-xen
2.6.18-400.1.1.el5
kernel-xen-devel
2.6.18-400.1.1.el5
ocfs2-2.6.18-400.1.1.el5
1.4.10-1.el5
ocfs2-2.6.18-400.1.1.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-400.1.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-400.1.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-400.1.1.el5
2.0.5-1.el5
oracleasm-2.6.18-400.1.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-400.1.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-400.1.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not ...
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.