Описание
ELSA-2016-2962: kernel security and bug fix update (IMPORTANT)
kernel [2.6.18-417]
- [virt] hv: do not lose pending heartbeat vmbus packets (Vitaly Kuznetsov) [1391167]
- [net] Fix use after free in the recvmmsg exit path (Davide Caratti) [1390044] {CVE-2016-7117}
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-417.el5
kernel-debug
2.6.18-417.el5
kernel-debug-devel
2.6.18-417.el5
kernel-devel
2.6.18-417.el5
kernel-doc
2.6.18-417.el5
kernel-headers
2.6.18-417.el5
kernel-xen
2.6.18-417.el5
kernel-xen-devel
2.6.18-417.el5
ocfs2-2.6.18-417.el5
1.4.11-1.el5
ocfs2-2.6.18-417.el5debug
1.4.11-1.el5
ocfs2-2.6.18-417.el5xen
1.4.11-1.el5
oracleasm-2.6.18-417.el5
2.0.5-2.el5
oracleasm-2.6.18-417.el5debug
2.0.5-2.el5
oracleasm-2.6.18-417.el5xen
2.0.5-2.el5
Oracle Linux x86_64
kernel
2.6.18-417.el5
kernel-debug
2.6.18-417.el5
kernel-debug-devel
2.6.18-417.el5
kernel-devel
2.6.18-417.el5
kernel-doc
2.6.18-417.el5
kernel-headers
2.6.18-417.el5
kernel-xen
2.6.18-417.el5
kernel-xen-devel
2.6.18-417.el5
ocfs2-2.6.18-417.el5
1.4.11-1.el5
ocfs2-2.6.18-417.el5debug
1.4.11-1.el5
ocfs2-2.6.18-417.el5xen
1.4.11-1.el5
oracleasm-2.6.18-417.el5
2.0.5-2.el5
oracleasm-2.6.18-417.el5debug
2.0.5-2.el5
oracleasm-2.6.18-417.el5xen
2.0.5-2.el5
Oracle Linux i386
kernel
2.6.18-417.el5
kernel-PAE
2.6.18-417.el5
kernel-PAE-devel
2.6.18-417.el5
kernel-debug
2.6.18-417.el5
kernel-debug-devel
2.6.18-417.el5
kernel-devel
2.6.18-417.el5
kernel-doc
2.6.18-417.el5
kernel-headers
2.6.18-417.el5
kernel-xen
2.6.18-417.el5
kernel-xen-devel
2.6.18-417.el5
ocfs2-2.6.18-417.el5
1.4.11-1.el5
ocfs2-2.6.18-417.el5PAE
1.4.11-1.el5
ocfs2-2.6.18-417.el5debug
1.4.11-1.el5
ocfs2-2.6.18-417.el5xen
1.4.11-1.el5
oracleasm-2.6.18-417.el5
2.0.5-2.el5
oracleasm-2.6.18-417.el5PAE
2.0.5-2.el5
oracleasm-2.6.18-417.el5debug
2.0.5-2.el5
oracleasm-2.6.18-417.el5xen
2.0.5-2.el5
Связанные CVE
Связанные уязвимости
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
Use-after-free vulnerability in the __sys_recvmmsg function in net/soc ...
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.