Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-1212

Опубликовано: 07 сент. 2011
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2011-1212: kernel security and bug fix update (IMPORTANT)

[2.6.18-274.3.1.0.1.el5]

  • [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]
  • [scsi] fix scsi hotplug and rescan race [orabug 10260172]
  • fix filp_close() race (Joe Jin) [orabug 10335998]
  • fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]
  • make xenkbd.abs_pointer=1 by default [orabug 67188919]
  • [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
  • [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki) [orabug 10315433]
  • [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]
  • [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
  • fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
  • [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105] RDS: Fix BUG_ONs to not fire when in a tasklet ipoib: Fix lockup of the tx queue RDS: Do not call set_page_dirty() with irqs off (Sherman Pun) RDS: Properly unmap when getting a remote access error (Tina Yang) RDS: Fix locking in rds_send_drop_to()
  • [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson) [orabug 9107465]
  • [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson) [orabug 9764220]
  • Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
  • fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro, Guru Anbalagane) [orabug 6124033]
  • [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
  • [ib] fix memory corruption (Andy Grover) [orabug 9972346]
  • [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]
  • [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)

[2.6.18-274.3.1.el5]

  • [xen] fix off-by-one shift in x86_64 __addr_ok (Laszlo Ersek) [728043 719850] {CVE-2011-2901}

[2.6.18-274.2.1.el5]

  • Fix up some fallout from RHEL5.7 kernel package structure changes

[2.6.18-274.1.1.el5]

  • [net] sctp: fix memory reclaim and panic in sctp_sock_rfree (Thomas Graf) [714869 714867]
  • [x86_64] Revert ACPI APIC mode test (Prarit Bhargava) [728163 721361]
  • [net] sctp: reset packet information after packet transmit (Thomas Graf) [727592 725573]
  • [fs] block: initialise bd_super in bdget (Lachlan McIlroy) [726628 707425]
  • [fs] nfs: Remove bogus call to nfs4_drop_state_owner (Jeff Layton) [726625 724923]
  • [net] be2net: clear interrupt bit in be_probe (Ivan Vecera) [723552 713703]
  • [net] be2net: remove certain cmd failure logging (Ivan Vecera) [726619 716821]
  • [wireless] nl80211: check for valid SSID size in scan operation (Stanislaw Gruszka) [718154 718155] {CVE-2011-2517}
  • [fs] xfs: handle NULL mount struct in error reports (Eric Sandeen) [727835 720551]
  • [fs] proc: restrict access to /proc/PID/io (Oleg Nesterov) [716827 716828] {CVE-2011-2495}
  • [fs] lockd: don't use file's credentials on RPCSEC_GSS mounts (Max Matveev) [722855 701574]
  • [fs] xfs: add a missing mutex_unlock to a dio error path (Jeff Moyer) [727590 718232]
  • [net] sunrpc: Don't hang forever on NLM unlock requests (Jeff Layton) [709546 709547] {CVE-2011-2491}
  • [xen] x86_emulate: Fix SAHF emulation (Igor Mammedov) [718883 718884]
  • [xen] Fix x86_emulate handling of imul with immediate operands (Igor Mammedov) [712885 700565]
  • [fs] Fix wrongly vfree'ing a kmalloc'ed area (Larry Woodman) [721300 719495]
  • [fs] dlm: bump default hash table and maximum allocatable sizes (Bryn M. Reeves) [719930 715603]
  • [net] tipc: Overhaul of socket locking logic (Max Matveev) [719746 704192]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-274.3.1.0.1.el5

kernel-debug

2.6.18-274.3.1.0.1.el5

kernel-debug-devel

2.6.18-274.3.1.0.1.el5

kernel-devel

2.6.18-274.3.1.0.1.el5

kernel-doc

2.6.18-274.3.1.0.1.el5

kernel-headers

2.6.18-274.3.1.0.1.el5

kernel-xen

2.6.18-274.3.1.0.1.el5

kernel-xen-devel

2.6.18-274.3.1.0.1.el5

ocfs2-2.6.18-274.3.1.0.1.el5

1.4.8-2.el5

ocfs2-2.6.18-274.3.1.0.1.el5debug

1.4.8-2.el5

ocfs2-2.6.18-274.3.1.0.1.el5xen

1.4.8-2.el5

oracleasm-2.6.18-274.3.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-274.3.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-274.3.1.0.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-274.3.1.0.1.el5

kernel-debug

2.6.18-274.3.1.0.1.el5

kernel-debug-devel

2.6.18-274.3.1.0.1.el5

kernel-devel

2.6.18-274.3.1.0.1.el5

kernel-doc

2.6.18-274.3.1.0.1.el5

kernel-headers

2.6.18-274.3.1.0.1.el5

kernel-xen

2.6.18-274.3.1.0.1.el5

kernel-xen-devel

2.6.18-274.3.1.0.1.el5

ocfs2-2.6.18-274.3.1.0.1.el5

1.4.8-2.el5

ocfs2-2.6.18-274.3.1.0.1.el5debug

1.4.8-2.el5

ocfs2-2.6.18-274.3.1.0.1.el5xen

1.4.8-2.el5

oracleasm-2.6.18-274.3.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-274.3.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-274.3.1.0.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-274.3.1.0.1.el5

kernel-PAE

2.6.18-274.3.1.0.1.el5

kernel-PAE-devel

2.6.18-274.3.1.0.1.el5

kernel-debug

2.6.18-274.3.1.0.1.el5

kernel-debug-devel

2.6.18-274.3.1.0.1.el5

kernel-devel

2.6.18-274.3.1.0.1.el5

kernel-doc

2.6.18-274.3.1.0.1.el5

kernel-headers

2.6.18-274.3.1.0.1.el5

kernel-xen

2.6.18-274.3.1.0.1.el5

kernel-xen-devel

2.6.18-274.3.1.0.1.el5

ocfs2-2.6.18-274.3.1.0.1.el5

1.4.8-2.el5

ocfs2-2.6.18-274.3.1.0.1.el5PAE

1.4.8-2.el5

ocfs2-2.6.18-274.3.1.0.1.el5debug

1.4.8-2.el5

ocfs2-2.6.18-274.3.1.0.1.el5xen

1.4.8-2.el5

oracleasm-2.6.18-274.3.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-274.3.1.0.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-274.3.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-274.3.1.0.1.el5xen

2.0.5-1.el5

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 12 лет назад

A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.

redhat
почти 14 лет назад

A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.

CVSS3: 7.5
nvd
около 12 лет назад

A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.

CVSS3: 7.5
debian
около 12 лет назад

A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/ ...

CVSS3: 7.5
github
около 3 лет назад

A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.

Уязвимость ELSA-2011-1212