Описание
ELSA-2016-3566: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.278.3]
- net: add validation for the socket syscall protocol argument (Hannes Frederic Sowa) [Orabug: 23267976] {CVE-2015-8543} {CVE-2015-8543}
- ipv6: addrconf: validate new MTU before applying it (Marcelo Leitner) [Orabug: 23263251] {CVE-2015-8215}
- ext4: avoid hang when mounting non-journal filesystems with orphan list (Theodore Ts'o) [Orabug: 23262219] {CVE-2015-7509}
- ext4: make orphan functions be no-op in no-journal mode (Anatol Pomozov) [Orabug: 23262219] {CVE-2015-7509}
- unix: properly account for FDs passed over unix sockets (willy tarreau) [Orabug: 23262265] {CVE-2013-4312} {CVE-2013-4312}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.278.3.el5uek
kernel-uek-debug
2.6.39-400.278.3.el5uek
kernel-uek-debug-devel
2.6.39-400.278.3.el5uek
kernel-uek-devel
2.6.39-400.278.3.el5uek
kernel-uek-doc
2.6.39-400.278.3.el5uek
kernel-uek-firmware
2.6.39-400.278.3.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.278.3.el5uek
kernel-uek-debug
2.6.39-400.278.3.el5uek
kernel-uek-debug-devel
2.6.39-400.278.3.el5uek
kernel-uek-devel
2.6.39-400.278.3.el5uek
kernel-uek-doc
2.6.39-400.278.3.el5uek
kernel-uek-firmware
2.6.39-400.278.3.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.278.3.el6uek
kernel-uek-debug
2.6.39-400.278.3.el6uek
kernel-uek-debug-devel
2.6.39-400.278.3.el6uek
kernel-uek-devel
2.6.39-400.278.3.el6uek
kernel-uek-doc
2.6.39-400.278.3.el6uek
kernel-uek-firmware
2.6.39-400.278.3.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.278.3.el6uek
kernel-uek-debug
2.6.39-400.278.3.el6uek
kernel-uek-debug-devel
2.6.39-400.278.3.el6uek
kernel-uek-devel
2.6.39-400.278.3.el6uek
kernel-uek-doc
2.6.39-400.278.3.el6uek
kernel-uek-firmware
2.6.39-400.278.3.el6uek
Связанные CVE
Связанные уязвимости
ELSA-2016-3567: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2016-0855: kernel security, bug fix, and enhancement update (MODERATE)
ELSA-2016-3565: Unbreakable Enterprise kernel security update (IMPORTANT)
fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.
fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.