Описание
ELSA-2017-3516: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.294.2]
- vfs: read file_handle only once in handle_to_path (Sasha Levin) [Orabug: 25388709] {CVE-2015-1420}
- crypto: algif_hash - Only export and import on sockets with data (Herbert Xu) [Orabug: 25417807]
- USB: usbfs: fix potential infoleak in devio (Kangjie Lu) [Orabug: 25462763] {CVE-2016-4482}
- net: fix infoleak in llc (Kangjie Lu) [Orabug: 25462811] {CVE-2016-4485}
- af_unix: Guard against other == sk in unix_dgram_sendmsg (Rainer Weikusat) [Orabug: 25464000] {CVE-2013-7446}
- unix: avoid use-after-free in ep_remove_wait_queue (Rainer Weikusat) [Orabug: 25464000] {CVE-2013-7446}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.294.2.el5uek
kernel-uek-debug
2.6.39-400.294.2.el5uek
kernel-uek-debug-devel
2.6.39-400.294.2.el5uek
kernel-uek-devel
2.6.39-400.294.2.el5uek
kernel-uek-doc
2.6.39-400.294.2.el5uek
kernel-uek-firmware
2.6.39-400.294.2.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.294.2.el5uek
kernel-uek-debug
2.6.39-400.294.2.el5uek
kernel-uek-debug-devel
2.6.39-400.294.2.el5uek
kernel-uek-devel
2.6.39-400.294.2.el5uek
kernel-uek-doc
2.6.39-400.294.2.el5uek
kernel-uek-firmware
2.6.39-400.294.2.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.294.2.el6uek
kernel-uek-debug
2.6.39-400.294.2.el6uek
kernel-uek-debug-devel
2.6.39-400.294.2.el6uek
kernel-uek-devel
2.6.39-400.294.2.el6uek
kernel-uek-doc
2.6.39-400.294.2.el6uek
kernel-uek-firmware
2.6.39-400.294.2.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.294.2.el6uek
kernel-uek-debug
2.6.39-400.294.2.el6uek
kernel-uek-debug-devel
2.6.39-400.294.2.el6uek
kernel-uek-devel
2.6.39-400.294.2.el6uek
kernel-uek-doc
2.6.39-400.294.2.el6uek
kernel-uek-firmware
2.6.39-400.294.2.el6uek
Ссылки на источники
Связанные уязвимости
ELSA-2017-3515: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3514: Unbreakable Enterprise kernel security update (IMPORTANT)
Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.