Описание
ELSA-2016-2124: kernel security and bug fix update (IMPORTANT)
kernel [2.6.18-416]
- [mm] Fix Privilege escalation via MAP_PRIVATE (Larry Woodman) [1385112] {CVE-2016-5195}
[2.6.18-415]
- [fs] gfs2: Initialize atime of I_NEW inodes (Andreas Grunbacher) [1374861]
- [fs] gfs2: Update file times after grabbing glock (Andreas Grunbacher) [1374861]
- Revert: [fs] gfs2: Only refresh newer in-memory timestamps (Andreas Grunbacher) [1374861]
[2.6.18-414]
- [redhat] Fix missed -413 kernel version (Alexander Gordeev)
[2.6.18-413]
- [redhat] Disable 'Invalid version (double separator '-')' error (Alexander Gordeev) [1375746]
- [fs] jbd: Fix oops in journal_remove_journal_head() (Lukas Czerner) [1067708]
- [fs] jbd: Fix race between CP and journal_get_write_access() (Lukas Czerner) [1067708]
- [fs] ecryptfs: prevent mounts backed by procfs (Mateusz Guzik) [1347100] {CVE-2016-1583}
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-416.el5
kernel-debug
2.6.18-416.el5
kernel-debug-devel
2.6.18-416.el5
kernel-devel
2.6.18-416.el5
kernel-doc
2.6.18-416.el5
kernel-headers
2.6.18-416.el5
kernel-xen
2.6.18-416.el5
kernel-xen-devel
2.6.18-416.el5
ocfs2-2.6.18-416.el5
1.4.11-1.el5
ocfs2-2.6.18-416.el5debug
1.4.11-1.el5
ocfs2-2.6.18-416.el5xen
1.4.11-1.el5
oracleasm-2.6.18-416.el5
2.0.5-2.el5
oracleasm-2.6.18-416.el5debug
2.0.5-2.el5
oracleasm-2.6.18-416.el5xen
2.0.5-2.el5
Oracle Linux x86_64
kernel
2.6.18-416.el5
kernel-debug
2.6.18-416.el5
kernel-debug-devel
2.6.18-416.el5
kernel-devel
2.6.18-416.el5
kernel-doc
2.6.18-416.el5
kernel-headers
2.6.18-416.el5
kernel-xen
2.6.18-416.el5
kernel-xen-devel
2.6.18-416.el5
ocfs2-2.6.18-416.el5
1.4.11-1.el5
ocfs2-2.6.18-416.el5debug
1.4.11-1.el5
ocfs2-2.6.18-416.el5xen
1.4.11-1.el5
oracleasm-2.6.18-416.el5
2.0.5-2.el5
oracleasm-2.6.18-416.el5debug
2.0.5-2.el5
oracleasm-2.6.18-416.el5xen
2.0.5-2.el5
Oracle Linux i386
kernel
2.6.18-416.el5
kernel-PAE
2.6.18-416.el5
kernel-PAE-devel
2.6.18-416.el5
kernel-debug
2.6.18-416.el5
kernel-debug-devel
2.6.18-416.el5
kernel-devel
2.6.18-416.el5
kernel-doc
2.6.18-416.el5
kernel-headers
2.6.18-416.el5
kernel-xen
2.6.18-416.el5
kernel-xen-devel
2.6.18-416.el5
ocfs2-2.6.18-416.el5
1.4.11-1.el5
ocfs2-2.6.18-416.el5PAE
1.4.11-1.el5
ocfs2-2.6.18-416.el5debug
1.4.11-1.el5
ocfs2-2.6.18-416.el5xen
1.4.11-1.el5
oracleasm-2.6.18-416.el5
2.0.5-2.el5
oracleasm-2.6.18-416.el5PAE
2.0.5-2.el5
oracleasm-2.6.18-416.el5debug
2.0.5-2.el5
oracleasm-2.6.18-416.el5xen
2.0.5-2.el5
Связанные CVE
Связанные уязвимости
ELSA-2016-2124-1: kernel security and bug fix update (IMPORTANT)
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the ...