Описание
ELSA-2015-3033: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.249.4]
- isofs: Fix unchecked printing of ER records (Jan Kara) [Orabug: 20930552] {CVE-2014-9584}
- selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID. (Stephen Smalley) [Orabug: 20930502] {CVE-2014-3215}
- Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs (Andy Lutomirski) [Orabug: 20930518] {CVE-2014-3215}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.249.4.el5uek
kernel-uek-debug
2.6.39-400.249.4.el5uek
kernel-uek-debug-devel
2.6.39-400.249.4.el5uek
kernel-uek-devel
2.6.39-400.249.4.el5uek
kernel-uek-doc
2.6.39-400.249.4.el5uek
kernel-uek-firmware
2.6.39-400.249.4.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.249.4.el5uek
kernel-uek-debug
2.6.39-400.249.4.el5uek
kernel-uek-debug-devel
2.6.39-400.249.4.el5uek
kernel-uek-devel
2.6.39-400.249.4.el5uek
kernel-uek-doc
2.6.39-400.249.4.el5uek
kernel-uek-firmware
2.6.39-400.249.4.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.249.4.el6uek
kernel-uek-debug
2.6.39-400.249.4.el6uek
kernel-uek-debug-devel
2.6.39-400.249.4.el6uek
kernel-uek-devel
2.6.39-400.249.4.el6uek
kernel-uek-doc
2.6.39-400.249.4.el6uek
kernel-uek-firmware
2.6.39-400.249.4.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.249.4.el6uek
kernel-uek-debug
2.6.39-400.249.4.el6uek
kernel-uek-debug-devel
2.6.39-400.249.4.el6uek
kernel-uek-devel
2.6.39-400.249.4.el6uek
kernel-uek-doc
2.6.39-400.249.4.el6uek
kernel-uek-firmware
2.6.39-400.249.4.el6uek
Связанные CVE
Связанные уязвимости
ELSA-2015-3034: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2015-3032: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2015-0864: kernel security and bug fix update (IMPORTANT)
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.