Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-3053

Опубликовано: 29 июл. 2015
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2015-3053: Unbreakable Enterprise kernel security update (MODERATE)

kernel-uek [3.8.13-68.3.5]

  • KVM: x86: SYSENTER emulation is broken (Nadav Amit) [Orabug: 21502739] {CVE-2015-0239} {CVE-2015-0239}
  • fs: take i_mutex during prepare_binprm for set[ug]id executables (Jann Horn) [Orabug: 21502254] {CVE-2015-3339}
  • eCryptfs: Remove buggy and unnecessary write in file name decode routine (Michael Halcrow) [Orabug: 21502065] {CVE-2014-9683}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-68.3.5.el6uek

0.4.3-4.el6

kernel-uek

3.8.13-68.3.5.el6uek

kernel-uek-debug

3.8.13-68.3.5.el6uek

kernel-uek-debug-devel

3.8.13-68.3.5.el6uek

kernel-uek-devel

3.8.13-68.3.5.el6uek

kernel-uek-doc

3.8.13-68.3.5.el6uek

kernel-uek-firmware

3.8.13-68.3.5.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-3.8.13-68.3.5.el7uek

0.4.3-4.el7

kernel-uek

3.8.13-68.3.5.el7uek

kernel-uek-debug

3.8.13-68.3.5.el7uek

kernel-uek-debug-devel

3.8.13-68.3.5.el7uek

kernel-uek-devel

3.8.13-68.3.5.el7uek

kernel-uek-doc

3.8.13-68.3.5.el7uek

kernel-uek-firmware

3.8.13-68.3.5.el7uek

Связанные уязвимости

oracle-oval
почти 10 лет назад

ELSA-2015-3055: Unbreakable Enterprise kernel security update (MODERATE)

oracle-oval
почти 10 лет назад

ELSA-2015-3054: Unbreakable Enterprise kernel security update (MODERATE)

oracle-oval
почти 10 лет назад

ELSA-2015-1272: kernel security, bug fix, and enhancement update (MODERATE)

ubuntu
около 10 лет назад

Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.

redhat
около 10 лет назад

Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.