Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-2025

Опубликовано: 24 авг. 2011
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

[2.6.32-200.19.1.el6uek]

  • Apply new fix for CVE-2011-1576.

[2.6.32-200.18.1.el6uek]

  • Revert 'proc: fix a race in do_io_accounting'

[2.6.32-200.17.1.el6uek]

  • net: Fix memory leak/corruption on VLAN GRO_DROP {CVE-2011-1576}
  • iommu-api: Extension to check for interrupt remapping {CVE-2011-1898}
  • KVM: IOMMU: Disable device assignment without interrupt remapping {CVE-2011-1898}
  • ext4: Fix max file size and logical block counting of extent format file {CVE-2011-2695}
  • nl80211: fix overflow in ssid_len {CVE-2011-2517}
  • Bluetooth: Prevent buffer overflow in l2cap config request {CVE-2011-2497}
  • proc: fix a race in do_io_accounting() {CVE-2011-2495}
  • proc: restrict access to /proc/PID/io {CVE-2011-2495}
  • Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace {CVE-2011-2492}
  • NLM: Don't hang forever on NLM unlock requests {CVE-2011-2491}
  • ksm: fix NULL pointer dereference in scan_get_next_rmap_item() {CVE-2011-2183}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.32-200.19.1.el5uek

kernel-uek-debug

2.6.32-200.19.1.el5uek

kernel-uek-debug-devel

2.6.32-200.19.1.el5uek

kernel-uek-devel

2.6.32-200.19.1.el5uek

kernel-uek-doc

2.6.32-200.19.1.el5uek

kernel-uek-firmware

2.6.32-200.19.1.el5uek

kernel-uek-headers

2.6.32-200.19.1.el5uek

ofa-2.6.32-200.19.1.el5uek

1.5.1-4.0.28

ofa-2.6.32-200.19.1.el5uekdebug

1.5.1-4.0.28

Oracle Linux i386

kernel-uek

2.6.32-200.19.1.el5uek

kernel-uek-debug

2.6.32-200.19.1.el5uek

kernel-uek-debug-devel

2.6.32-200.19.1.el5uek

kernel-uek-devel

2.6.32-200.19.1.el5uek

kernel-uek-doc

2.6.32-200.19.1.el5uek

kernel-uek-firmware

2.6.32-200.19.1.el5uek

kernel-uek-headers

2.6.32-200.19.1.el5uek

ofa-2.6.32-200.19.1.el5uek

1.5.1-4.0.28

ofa-2.6.32-200.19.1.el5uekdebug

1.5.1-4.0.28

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-200.19.1.el6uek

kernel-uek-debug

2.6.32-200.19.1.el6uek

kernel-uek-debug-devel

2.6.32-200.19.1.el6uek

kernel-uek-devel

2.6.32-200.19.1.el6uek

kernel-uek-doc

2.6.32-200.19.1.el6uek

kernel-uek-firmware

2.6.32-200.19.1.el6uek

kernel-uek-headers

2.6.32-200.19.1.el6uek

ofa-2.6.32-200.19.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-200.19.1.el6uekdebug

1.5.1-4.0.47

Oracle Linux i686

kernel-uek

2.6.32-200.19.1.el6uek

kernel-uek-debug

2.6.32-200.19.1.el6uek

kernel-uek-debug-devel

2.6.32-200.19.1.el6uek

kernel-uek-devel

2.6.32-200.19.1.el6uek

kernel-uek-doc

2.6.32-200.19.1.el6uek

kernel-uek-firmware

2.6.32-200.19.1.el6uek

kernel-uek-headers

2.6.32-200.19.1.el6uek

ofa-2.6.32-200.19.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-200.19.1.el6uekdebug

1.5.1-4.0.47

Связанные уязвимости

oracle-oval
почти 14 лет назад

ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)

ubuntu
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

redhat
около 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

nvd
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

debian
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...