Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-3528

Опубликовано: 23 мар. 2016
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2016-3528: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [3.8.13-118.4.2]

  • pipe: Fix buffer offset after partially failed read (Ben Hutchings) [Orabug: 22985903] {CVE-2016-0774} {CVE-2015-1805} {CVE-2016-0774}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-118.4.2.el6uek

0.4.5-3.el6

kernel-uek

3.8.13-118.4.2.el6uek

kernel-uek-debug

3.8.13-118.4.2.el6uek

kernel-uek-debug-devel

3.8.13-118.4.2.el6uek

kernel-uek-devel

3.8.13-118.4.2.el6uek

kernel-uek-doc

3.8.13-118.4.2.el6uek

kernel-uek-firmware

3.8.13-118.4.2.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-3.8.13-118.4.2.el7uek

0.4.5-3.el7

kernel-uek

3.8.13-118.4.2.el7uek

kernel-uek-debug

3.8.13-118.4.2.el7uek

kernel-uek-debug-devel

3.8.13-118.4.2.el7uek

kernel-uek-devel

3.8.13-118.4.2.el7uek

kernel-uek-doc

3.8.13-118.4.2.el7uek

kernel-uek-firmware

3.8.13-118.4.2.el7uek

Связанные CVE

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.

redhat
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.

CVSS3: 6.8
nvd
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.

CVSS3: 6.8
debian
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a ...

CVSS3: 6.8
github
больше 3 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.