Описание
ELSA-2019-4646: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.311.1]
- USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data (Hui Peng) {CVE-2018-19985} {CVE-2018-19985}
- binfmt_elf: switch to new creds when switching to new mm (Linus Torvalds) [Orabug: 29677235] {CVE-2019-11190}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.311.1.el5uek
kernel-uek-debug
2.6.39-400.311.1.el5uek
kernel-uek-debug-devel
2.6.39-400.311.1.el5uek
kernel-uek-devel
2.6.39-400.311.1.el5uek
kernel-uek-doc
2.6.39-400.311.1.el5uek
kernel-uek-firmware
2.6.39-400.311.1.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.311.1.el5uek
kernel-uek-debug
2.6.39-400.311.1.el5uek
kernel-uek-debug-devel
2.6.39-400.311.1.el5uek
kernel-uek-devel
2.6.39-400.311.1.el5uek
kernel-uek-doc
2.6.39-400.311.1.el5uek
kernel-uek-firmware
2.6.39-400.311.1.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.311.1.el6uek
kernel-uek-debug
2.6.39-400.311.1.el6uek
kernel-uek-debug-devel
2.6.39-400.311.1.el6uek
kernel-uek-devel
2.6.39-400.311.1.el6uek
kernel-uek-doc
2.6.39-400.311.1.el6uek
kernel-uek-firmware
2.6.39-400.311.1.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.311.1.el6uek
kernel-uek-debug
2.6.39-400.311.1.el6uek
kernel-uek-debug-devel
2.6.39-400.311.1.el6uek
kernel-uek-devel
2.6.39-400.311.1.el6uek
kernel-uek-doc
2.6.39-400.311.1.el6uek
kernel-uek-firmware
2.6.39-400.311.1.el6uek
Связанные CVE
Связанные уязвимости
ELSA-2019-4645: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4642: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4644: Unbreakable Enterprise kernel security update (IMPORTANT)
The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.