Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-2024

Опубликовано: 19 авг. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2011-2024: Oracle Linux 6 Unbreakable Enterprise kernel security and bug fix update (MODERATE)

[2.6.32-200.16.1.el6uek]

  • Revert change to restore DEFAULTKERNEL

[2.6.32-200.15.1.el6uek]

  • Add -u parameter to kernel_variant_post to make it work properly for uek [orabug 12819958]

[2.6.32-200.14.1.el6uek]

  • Restore DEFAULTKERNEL value to kernel-uek [orabug 12819958]

[2.6.32-200.13.1.el6uek]

  • make default kernel kernel-uek (Kevin Lyons) [orabug 12803424]

[2.6.32-200.12.1.el6uek]

  • SCSI: Fix oops dereferencing queue (Martin K. Petersen) [orabug 12741636]

[2.6.32-200.11.1.el6uek]

  • inet_diag: fix inet_diag_bc_audit() (Eric Dumazet) [CVE-2011-2213]

[2.6.32-200.10.8.el6uek]

  • block: export blk_{get,put}_queue() (Jens Axboe)
  • [SCSI] Fix oops caused by queue refcounting failure (James Bottomley)
  • [dm-mpath] maintain reference count for underlying devices (Martin K. Petersen)

[2.6.32-200.10.7.el6uek]

  • [net] gre: fix netns vs proto registration ordering {CVE-2011-1767}
  • [net] tunnels: fix netns vs proto registration ordering {CVE-2011-1768}
  • [rps] don't free rx_queue until netdevice is freed (Dave Kleikamp) [orabug 11071685]

[2.6.32-200.10.6.el6uek]

  • Add entropy generation to nics (John Sobecki) [10622900]
  • [SCSI] compat_ioct: fix bsg SG_IO [orabug 12732464]
  • ipc/sem.c: error path in try_atomic_semop() left spinlock locked

[2.6.32-200.10.5.el6uek]

  • update kabi

[2.6.32-200.10.4.el6uek]

  • block: Fix double free in blk_integrity_unregister [orabug 12707880]
  • block: Make the integrity mapped property a bio flag [orabug 12707880]
  • dm mpath: do not fail paths after integrity errors [orabug 12707880]
  • dm ioctl: refactor dm_table_complete [orabug 12707880]
  • block: Require subsystems to explicitly allocate bio_set integrity mempool [orabug 12707880]
  • dm: improve block integrity support [orabug 12707880]
  • sd: Update protection mode strings [orabug 12707880]
  • [SCSI] fix propogation of integrity errors [orabug 12707880]
  • [SCSI] modify change_queue_depth to take in reason why it is being called [orabug 12707880]
  • [SCSI] scsi error: have scsi-ml call change_queue_depth to handle QUEUE_FULL [orabug 12707880]
  • [SCSI] add queue_depth ramp up code [orabug 12707880]
  • [SCSI] scsi_dh: Change the scsidh_activate interface to be asynchronous [orabug 12707880]
  • SCSI: Updated RDAC device handler [orabug 12707880]
  • [SCSI] scsi_dh: propagate SCSI device deletion [orabug 12707880]
  • [SCSI] scsi_dh: fix reference counting in scsi_dh_activate error path [orabug 12707880]
  • qla2xxx: Driver update from QLogic [orabug 12707880]
  • lpfc 8.3.5.44 driver update from Emulex [orabug 12707880]
  • Add Hydra (hxge) support [orabug 12314121]
  • update hxge to 1.3.1 [orabug 12314121]
  • Hide mwait, TSC invariance and MTRR capability in published CPUID

[2.6.32-200.10.3.el6uek]

  • [config] Revert Add some usb devices supported
  • [config] make all usb drivers part of the kernel.
  • [fs] NFS: Don't SIGBUS if nfs_vm_page_mkwrite races with a cache invalidation [orabug 10435482]

[2.6.32-200.10.2.el6uek]

  • [config] Add some usb devices supported.

[2.6.32-200.10.1.el6uek]

  • update kabi changes and revision to -200 series

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-200.16.1.el6uek

kernel-uek-debug

2.6.32-200.16.1.el6uek

kernel-uek-debug-devel

2.6.32-200.16.1.el6uek

kernel-uek-devel

2.6.32-200.16.1.el6uek

kernel-uek-doc

2.6.32-200.16.1.el6uek

kernel-uek-firmware

2.6.32-200.16.1.el6uek

kernel-uek-headers

2.6.32-200.16.1.el6uek

ofa-2.6.32-200.16.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-200.16.1.el6uekdebug

1.5.1-4.0.47

Oracle Linux i686

kernel-uek

2.6.32-200.16.1.el6uek

kernel-uek-debug

2.6.32-200.16.1.el6uek

kernel-uek-debug-devel

2.6.32-200.16.1.el6uek

kernel-uek-devel

2.6.32-200.16.1.el6uek

kernel-uek-doc

2.6.32-200.16.1.el6uek

kernel-uek-firmware

2.6.32-200.16.1.el6uek

kernel-uek-headers

2.6.32-200.16.1.el6uek

ofa-2.6.32-200.16.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-200.16.1.el6uekdebug

1.5.1-4.0.47

Связанные уязвимости

oracle-oval
почти 14 лет назад

ELSA-2011-2021: Oracle Linux 6 Unbreakable Enterprise kernel security fix update (MODERATE)

oracle-oval
почти 14 лет назад

ELSA-2011-0928: kernel security and bug fix update (MODERATE)

ubuntu
почти 14 лет назад

The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.

redhat
около 14 лет назад

The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.

nvd
почти 14 лет назад

The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.

Уязвимость ELSA-2011-2024