Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-3644

Опубликовано: 20 нояб. 2016
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2016-3644: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [4.1.12-61.1.19]

  • acpi: Disable ACPI table override if securelevel is set (Linn Crosetto) [Orabug: 25058966] {CVE-2016-3699}
  • aacraid: Check size values after double-fetch from user (Dave Carroll) [Orabug: 25060060] {CVE-2016-6480} {CVE-2016-6480}
  • audit: fix a double fetch in audit_log_single_execve_arg() (Paul Moore) [Orabug: 25059969] {CVE-2016-6136}
  • ecryptfs: don't allow mmap when the lower fs doesn't support it (Jeff Mahoney) [Orabug: 25023269] {CVE-2016-1583} {CVE-2016-1583}
  • Revert 'ecryptfs: forbid opening files without mmap handler' (Chuck Anderson) [Orabug: 24971921] {CVE-2016-1583}
  • percpu: fix synchronization between synchronous map extension and chunk destruction (Tejun Heo) [Orabug: 25060084] {CVE-2016-4794}
  • percpu: fix synchronization between chunk->map_extend_work and chunk destruction (Tejun Heo) [Orabug: 25060084] {CVE-2016-4794}
  • ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt (Kangjie Lu) [Orabug: 25059898] {CVE-2016-4578}
  • ALSA: timer: Fix leak in events via snd_timer_user_ccallback (Kangjie Lu) [Orabug: 25059898] {CVE-2016-4578}
  • ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (Kangjie Lu) [Orabug: 25059752] {CVE-2016-4569}
  • Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (Jaganath Kanakkassery) [Orabug: 25058894] {CVE-2015-8956}
  • ASN.1: Fix non-match detection failure on data overrun (David Howells) [Orabug: 25059037] {CVE-2016-2053}
  • mm: migrate dirty page without clear_page_dirty_for_io etc (Hugh Dickins) [Orabug: 25059188] {CVE-2016-3070}

[4.1.12-61.1.18]

  • uek-rpm ol7: change uek-rpm/ol7/update-el release value from 7.1 to 7.3 (Chuck Anderson) [Orabug: 25050614]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-4.1.12-61.1.19.el6uek

0.5.3-2.el6

kernel-uek

4.1.12-61.1.19.el6uek

kernel-uek-debug

4.1.12-61.1.19.el6uek

kernel-uek-debug-devel

4.1.12-61.1.19.el6uek

kernel-uek-devel

4.1.12-61.1.19.el6uek

kernel-uek-doc

4.1.12-61.1.19.el6uek

kernel-uek-firmware

4.1.12-61.1.19.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-4.1.12-61.1.19.el7uek

0.5.3-2.el7

kernel-uek

4.1.12-61.1.19.el7uek

kernel-uek-debug

4.1.12-61.1.19.el7uek

kernel-uek-debug-devel

4.1.12-61.1.19.el7uek

kernel-uek-devel

4.1.12-61.1.19.el7uek

kernel-uek-doc

4.1.12-61.1.19.el7uek

kernel-uek-firmware

4.1.12-61.1.19.el7uek

Связанные уязвимости

oracle-oval
около 9 лет назад

ELSA-2016-3645: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
около 9 лет назад

ELSA-2016-2574: kernel security, bug fix, and enhancement update (IMPORTANT)

oracle-oval
около 9 лет назад

ELSA-2016-3646: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 7.4
ubuntu
около 9 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

redhat
почти 10 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.