Описание
ELSA-2014-3067: unbreakable enterprise kernel security update (IMPORTANT)
kernel-uek [3.8.13-35.3.5.el7uek]
- net: Use netlink_ns_capable to verify the permisions of netlink messages (Eric W. Biederman) [Orabug: 19404231] {CVE-2014-0181}
- net: Add variants of capable for use on netlink messages (Eric W. Biederman) [Orabug: 19404231]
- net: Add variants of capable for use on on sockets (Eric W. Biederman) [Orabug: 19404231]
- netlink: Rename netlink_capable netlink_allowed (Eric W. Biederman) [Orabug: 19404231]
- sctp: Fix sk_ack_backlog wrap-around problem (Xufeng Zhang) [Orabug: 19404244] {CVE-2014-4667}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dtrace-modules-3.8.13-35.3.5.el6uek
0.4.3-4.el6
kernel-uek
3.8.13-35.3.5.el6uek
kernel-uek-debug
3.8.13-35.3.5.el6uek
kernel-uek-debug-devel
3.8.13-35.3.5.el6uek
kernel-uek-devel
3.8.13-35.3.5.el6uek
kernel-uek-doc
3.8.13-35.3.5.el6uek
kernel-uek-firmware
3.8.13-35.3.5.el6uek
Oracle Linux 7
Oracle Linux x86_64
dtrace-modules-3.8.13-35.3.5.el7uek
0.4.3-4.el7
kernel-uek
3.8.13-35.3.5.el7uek
kernel-uek-debug
3.8.13-35.3.5.el7uek
kernel-uek-debug-devel
3.8.13-35.3.5.el7uek
kernel-uek-devel
3.8.13-35.3.5.el7uek
kernel-uek-doc
3.8.13-35.3.5.el7uek
kernel-uek-firmware
3.8.13-35.3.5.el7uek
Связанные CVE
Связанные уязвимости
ELSA-2014-1023: kernel security and bug fix update (IMPORTANT)
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
The Netlink implementation in the Linux kernel through 3.14.1 does not ...