Описание
ELSA-2017-3596: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [3.8.13-118.19.3]
- posix_acl: Clear SGID bit when setting file permissions (Jan Kara) [Orabug: 25507344] {CVE-2016-7097} {CVE-2016-7097}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dtrace-modules-3.8.13-118.19.3.el6uek
0.4.5-3.el6
kernel-uek
3.8.13-118.19.3.el6uek
kernel-uek-debug
3.8.13-118.19.3.el6uek
kernel-uek-debug-devel
3.8.13-118.19.3.el6uek
kernel-uek-devel
3.8.13-118.19.3.el6uek
kernel-uek-doc
3.8.13-118.19.3.el6uek
kernel-uek-firmware
3.8.13-118.19.3.el6uek
Oracle Linux 7
Oracle Linux x86_64
dtrace-modules-3.8.13-118.19.3.el7uek
0.4.5-3.el7
kernel-uek
3.8.13-118.19.3.el7uek
kernel-uek-debug
3.8.13-118.19.3.el7uek
kernel-uek-debug-devel
3.8.13-118.19.3.el7uek
kernel-uek-devel
3.8.13-118.19.3.el7uek
kernel-uek-doc
3.8.13-118.19.3.el7uek
kernel-uek-firmware
3.8.13-118.19.3.el7uek
Связанные CVE
Связанные уязвимости
The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
The filesystem implementation in the Linux kernel through 4.8.2 preser ...
The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.