Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-3510

Опубликовано: 20 янв. 2016
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2016-3510: kernel-uek security update (IMPORTANT)

kernel-uek [4.1.12-32.1.2]

  • KEYS: Fix keyring ref leak in join_session_keyring() (Yevgeny Pats) [Orabug: 22563965] {CVE-2016-0728}

[4.1.12-32.1.1]

  • ocfs2: return non-zero st_blocks for inline data (John Haxby) [Orabug: 22218243]
  • xen/events/fifo: Consume unprocessed events when a CPU dies (Ross Lagerwall) [Orabug: 22498877]
  • Revert 'xen/fb: allow xenfb initialization for hvm guests' (Konrad Rzeszutek Wilk)
  • xen/pciback: Dont allow MSI-X ops if PCI_COMMAND_MEMORY is not set. (Konrad Rzeszutek Wilk)
  • xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled. (Konrad Rzeszutek Wilk)
  • xen/pciback: Do not install an IRQ handler for MSI interrupts. (Konrad Rzeszutek Wilk)
  • xen/pciback: Return error on XEN_PCI_OP_enable_msix when device has MSI or MSI-X enabled (Konrad Rzeszutek Wilk)
  • xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled (Konrad Rzeszutek Wilk)
  • xen/pciback: Save xen_pci_op commands before processing it (Konrad Rzeszutek Wilk)
  • xen-scsiback: safely copy requests (David Vrabel)
  • xen-blkback: read from indirect descriptors only once (Roger Pau Monne)
  • xen-blkback: only read request operation from shared ring once (Roger Pau Monne)
  • xen-netback: use RING_COPY_REQUEST() throughout (David Vrabel)
  • xen-netback: dont use last request to determine minimum Tx credit (David Vrabel)
  • xen: Add RING_COPY_REQUEST() (David Vrabel)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-4.1.12-32.1.2.el6uek

0.5.1-1.el6

kernel-uek

4.1.12-32.1.2.el6uek

kernel-uek-debug

4.1.12-32.1.2.el6uek

kernel-uek-debug-devel

4.1.12-32.1.2.el6uek

kernel-uek-devel

4.1.12-32.1.2.el6uek

kernel-uek-doc

4.1.12-32.1.2.el6uek

kernel-uek-firmware

4.1.12-32.1.2.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-4.1.12-32.1.2.el7uek

0.5.1-1.el7

kernel-uek

4.1.12-32.1.2.el7uek

kernel-uek-debug

4.1.12-32.1.2.el7uek

kernel-uek-debug-devel

4.1.12-32.1.2.el7uek

kernel-uek-devel

4.1.12-32.1.2.el7uek

kernel-uek-doc

4.1.12-32.1.2.el7uek

kernel-uek-firmware

4.1.12-32.1.2.el7uek

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

redhat
больше 9 лет назад

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

CVSS3: 7.8
nvd
больше 9 лет назад

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

CVSS3: 7.8
debian
больше 9 лет назад

The join_session_keyring function in security/keys/process_keys.c in t ...

suse-cvrf
больше 9 лет назад

Security update for Kernel live patch 10