Описание
ELSA-2018-4233: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [3.8.13-118.24.3]
- exec: Limit arg stack to at most 75% of _STK_LIM (Kees Cook) [Orabug: 28710010] {CVE-2018-14634}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dtrace-modules-3.8.13-118.24.3.el6uek
0.4.5-3.el6
kernel-uek
3.8.13-118.24.3.el6uek
kernel-uek-debug
3.8.13-118.24.3.el6uek
kernel-uek-debug-devel
3.8.13-118.24.3.el6uek
kernel-uek-devel
3.8.13-118.24.3.el6uek
kernel-uek-doc
3.8.13-118.24.3.el6uek
kernel-uek-firmware
3.8.13-118.24.3.el6uek
Oracle Linux 7
Oracle Linux x86_64
dtrace-modules-3.8.13-118.24.3.el7uek
0.4.5-3.el7
kernel-uek
3.8.13-118.24.3.el7uek
kernel-uek-debug
3.8.13-118.24.3.el7uek
kernel-uek-debug-devel
3.8.13-118.24.3.el7uek
kernel-uek-devel
3.8.13-118.24.3.el7uek
kernel-uek-doc
3.8.13-118.24.3.el7uek
kernel-uek-firmware
3.8.13-118.24.3.el7uek
Связанные CVE
Связанные уязвимости
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
An integer overflow flaw was found in the Linux kernel's create_elf_ta ...
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.