Описание
ELSA-2010-2009: Oracle Linux 5 Unbreakable Enterprise kernel security fix update (IMPORTANT)
Following security bugs are fixed in this errata
CVE-2010-3904 When copying data to userspace, the RDS protocol failed to verify that the user-provided address was a valid userspace address. A local unprivileged user could issue specially crafted socket calls to write arbitrary values into kernel memory and potentially escalate privileges to root.
CVE-2010-3067 Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
CVE-2010-3477 The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
kernel:
[2.6.32-100.21.1.el5]
- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}
- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch
- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch
- [aio] linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch
ofa:
[1.5.1-4.0.23]
- Fix rds permissions checks during copies
[1.5.1-4.0.21]
- Update to BXOFED 1.5.1-1.3.6-5
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.32-100.21.1.el5
kernel-debug
2.6.32-100.21.1.el5
kernel-debug-devel
2.6.32-100.21.1.el5
kernel-devel
2.6.32-100.21.1.el5
kernel-doc
2.6.32-100.21.1.el5
kernel-firmware
2.6.32-100.21.1.el5
kernel-headers
2.6.32-100.21.1.el5
ofa-2.6.32-100.21.1.el5
1.5.1-4.0.23
Связанные CVE
Связанные уязвимости
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
The rds_page_copy_user function in net/rds/page.c in the Reliable Data ...
ELSA-2011-0007: kernel security and bug fix update (IMPORTANT)