Описание
ELSA-2014-2010: kernel security update (IMPORTANT)
[3.10.0-123.13.2]
- Oracle Linux certificates (Alexey Petrenko)
[3.10.0-123.13.2]
- [x86] traps: stop using IST for #SS (Petr Matousek) [1172812 1172813] {CVE-2014-9322}
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
kernel
3.10.0-123.13.2.el7
kernel-abi-whitelists
3.10.0-123.13.2.el7
kernel-debug
3.10.0-123.13.2.el7
kernel-debug-devel
3.10.0-123.13.2.el7
kernel-devel
3.10.0-123.13.2.el7
kernel-doc
3.10.0-123.13.2.el7
kernel-headers
3.10.0-123.13.2.el7
kernel-tools
3.10.0-123.13.2.el7
kernel-tools-libs
3.10.0-123.13.2.el7
kernel-tools-libs-devel
3.10.0-123.13.2.el7
perf
3.10.0-123.13.2.el7
python-perf
3.10.0-123.13.2.el7
Связанные CVE
Связанные уязвимости
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not ...
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.