Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-3644

Опубликовано: 20 нояб. 2016
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2016-3644: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [4.1.12-61.1.19]

  • acpi: Disable ACPI table override if securelevel is set (Linn Crosetto) [Orabug: 25058966] {CVE-2016-3699}
  • aacraid: Check size values after double-fetch from user (Dave Carroll) [Orabug: 25060060] {CVE-2016-6480} {CVE-2016-6480}
  • audit: fix a double fetch in audit_log_single_execve_arg() (Paul Moore) [Orabug: 25059969] {CVE-2016-6136}
  • ecryptfs: don't allow mmap when the lower fs doesn't support it (Jeff Mahoney) [Orabug: 25023269] {CVE-2016-1583} {CVE-2016-1583}
  • Revert 'ecryptfs: forbid opening files without mmap handler' (Chuck Anderson) [Orabug: 24971921] {CVE-2016-1583}
  • percpu: fix synchronization between synchronous map extension and chunk destruction (Tejun Heo) [Orabug: 25060084] {CVE-2016-4794}
  • percpu: fix synchronization between chunk->map_extend_work and chunk destruction (Tejun Heo) [Orabug: 25060084] {CVE-2016-4794}
  • ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt (Kangjie Lu) [Orabug: 25059898] {CVE-2016-4578}
  • ALSA: timer: Fix leak in events via snd_timer_user_ccallback (Kangjie Lu) [Orabug: 25059898] {CVE-2016-4578}
  • ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (Kangjie Lu) [Orabug: 25059752] {CVE-2016-4569}
  • Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (Jaganath Kanakkassery) [Orabug: 25058894] {CVE-2015-8956}
  • ASN.1: Fix non-match detection failure on data overrun (David Howells) [Orabug: 25059037] {CVE-2016-2053}
  • mm: migrate dirty page without clear_page_dirty_for_io etc (Hugh Dickins) [Orabug: 25059188] {CVE-2016-3070}

[4.1.12-61.1.18]

  • uek-rpm ol7: change uek-rpm/ol7/update-el release value from 7.1 to 7.3 (Chuck Anderson) [Orabug: 25050614]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-4.1.12-61.1.19.el6uek

0.5.3-2.el6

kernel-uek

4.1.12-61.1.19.el6uek

kernel-uek-debug

4.1.12-61.1.19.el6uek

kernel-uek-debug-devel

4.1.12-61.1.19.el6uek

kernel-uek-devel

4.1.12-61.1.19.el6uek

kernel-uek-doc

4.1.12-61.1.19.el6uek

kernel-uek-firmware

4.1.12-61.1.19.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-4.1.12-61.1.19.el7uek

0.5.3-2.el7

kernel-uek

4.1.12-61.1.19.el7uek

kernel-uek-debug

4.1.12-61.1.19.el7uek

kernel-uek-debug-devel

4.1.12-61.1.19.el7uek

kernel-uek-devel

4.1.12-61.1.19.el7uek

kernel-uek-doc

4.1.12-61.1.19.el7uek

kernel-uek-firmware

4.1.12-61.1.19.el7uek

Связанные уязвимости

oracle-oval
больше 8 лет назад

ELSA-2016-3645: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
больше 8 лет назад

ELSA-2016-2574: kernel security, bug fix, and enhancement update (IMPORTANT)

oracle-oval
больше 8 лет назад

ELSA-2016-3646: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 7.4
ubuntu
больше 8 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

redhat
больше 9 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.