Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0936

Опубликовано: 30 сент. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0936: Important: kernel security update (IMPORTANT)

[2.6.18-8.1.14.0.2.el5]

  • Fix bonding primary=ethX (Bert Barbe) [IT 101532] [ORA 5136660]
  • Add entropy module option to e1000/bnx2 (John Sobecki) [ORA 6045759]

[2.6.18-8.1.14.el5]

  • Revert changes back to 2.6.18-8.1.10.
  • [x86_64] Zero extend all registers after ptrace in 32bit entry path (Anton Arapov ) [297871] {CVE-2007-4573}

[2.6.18-8.1.12.el5]

  • [x86_64] Don't leak NT bit into next task (Dave Anderson ) [298151] {CVE-2007-4574}
  • [fs] Reset current->pdeath_signal on SUID binary execution (Peter Zijlstra ) [252307] {CVE-2007-3848}
  • [misc] Bounds check ordering issue in random driver (Anton Arapov ) [275961] {CVE-2007-3105}
  • [usb] usblcd: Locally triggerable memory consumption (Anton Arapov ) [276001] {CVE-2007-3513}
  • [x86_64] Zero extend all registers after ptrace in 32bit entry path (Anton Arapov ) [297871] {CVE-2007-4573}
  • [net] igmp: check for NULL when allocating GFP_ATOMIC skbs (Neil Horman ) [303281]

[2.6.18-8.1.11.el5]

  • [xen] Guest access to MSR may cause system crash/data corruption (Bhavana Nagendra ) [253312] {CVE-2007-3733}
  • [dlm] A TCP connection to DLM port blocks DLM operations (Patrick Caulfield ) [245922] {CVE-2007-3380}
  • [ppc] 4k page mapping support for userspace in 64k kernels (Scott Moser ) [275841] {CVE-2007-3850}
  • [ptrace] NULL pointer dereference triggered by ptrace (Anton Arapov ) [275981] {CVE-2007-3731}
  • [fs] hugetlb: fix prio_tree unit (Konrad Rzeszutek ) [253929] {CVE-2007-4133}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel

2.6.18-8.1.14.0.2.el5

kernel-devel

2.6.18-8.1.14.0.2.el5

kernel-doc

2.6.18-8.1.14.0.2.el5

kernel-headers

2.6.18-8.1.14.0.2.el5

kernel-xen

2.6.18-8.1.14.0.2.el5

kernel-xen-devel

2.6.18-8.1.14.0.2.el5

ocfs2-2.6.18-8.1.14.0.2.el5

1.2.6-6.el5

ocfs2-2.6.18-8.1.14.0.2.el5xen

1.2.6-6.el5

oracleasm-2.6.18-8.1.14.0.2.el5

2.0.4-1.el5

oracleasm-2.6.18-8.1.14.0.2.el5xen

2.0.4-1.el5

Oracle Linux i386

kernel

2.6.18-8.1.14.0.2.el5

kernel-PAE

2.6.18-8.1.14.0.2.el5

kernel-PAE-devel

2.6.18-8.1.14.0.2.el5

kernel-devel

2.6.18-8.1.14.0.2.el5

kernel-doc

2.6.18-8.1.14.0.2.el5

kernel-headers

2.6.18-8.1.14.0.2.el5

kernel-xen

2.6.18-8.1.14.0.2.el5

kernel-xen-devel

2.6.18-8.1.14.0.2.el5

ocfs2-2.6.18-8.1.14.0.2.el5

1.2.6-6.el5

ocfs2-2.6.18-8.1.14.0.2.el5PAE

1.2.6-6.el5

ocfs2-2.6.18-8.1.14.0.2.el5xen

1.2.6-6.el5

oracleasm-2.6.18-8.1.14.0.2.el5

2.0.4-1.el5

oracleasm-2.6.18-8.1.14.0.2.el5PAE

2.0.4-1.el5

oracleasm-2.6.18-8.1.14.0.2.el5xen

2.0.4-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 17 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

redhat
больше 17 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

nvd
больше 17 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

debian
больше 17 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and ...

github
около 3 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

Уязвимость ELSA-2007-0936