Описание
ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)
[2.6.32-200.19.1.el6uek]
- Apply new fix for CVE-2011-1576.
[2.6.32-200.18.1.el6uek]
- Revert 'proc: fix a race in do_io_accounting'
[2.6.32-200.17.1.el6uek]
- net: Fix memory leak/corruption on VLAN GRO_DROP {CVE-2011-1576}
- iommu-api: Extension to check for interrupt remapping {CVE-2011-1898}
- KVM: IOMMU: Disable device assignment without interrupt remapping {CVE-2011-1898}
- ext4: Fix max file size and logical block counting of extent format file {CVE-2011-2695}
- nl80211: fix overflow in ssid_len {CVE-2011-2517}
- Bluetooth: Prevent buffer overflow in l2cap config request {CVE-2011-2497}
- proc: fix a race in do_io_accounting() {CVE-2011-2495}
- proc: restrict access to /proc/PID/io {CVE-2011-2495}
- Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace {CVE-2011-2492}
- NLM: Don't hang forever on NLM unlock requests {CVE-2011-2491}
- ksm: fix NULL pointer dereference in scan_get_next_rmap_item() {CVE-2011-2183}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-200.19.1.el5uek
kernel-uek-debug
2.6.32-200.19.1.el5uek
kernel-uek-debug-devel
2.6.32-200.19.1.el5uek
kernel-uek-devel
2.6.32-200.19.1.el5uek
kernel-uek-doc
2.6.32-200.19.1.el5uek
kernel-uek-firmware
2.6.32-200.19.1.el5uek
kernel-uek-headers
2.6.32-200.19.1.el5uek
ofa-2.6.32-200.19.1.el5uek
1.5.1-4.0.28
ofa-2.6.32-200.19.1.el5uekdebug
1.5.1-4.0.28
Oracle Linux i386
kernel-uek
2.6.32-200.19.1.el5uek
kernel-uek-debug
2.6.32-200.19.1.el5uek
kernel-uek-debug-devel
2.6.32-200.19.1.el5uek
kernel-uek-devel
2.6.32-200.19.1.el5uek
kernel-uek-doc
2.6.32-200.19.1.el5uek
kernel-uek-firmware
2.6.32-200.19.1.el5uek
kernel-uek-headers
2.6.32-200.19.1.el5uek
ofa-2.6.32-200.19.1.el5uek
1.5.1-4.0.28
ofa-2.6.32-200.19.1.el5uekdebug
1.5.1-4.0.28
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-200.19.1.el6uek
kernel-uek-debug
2.6.32-200.19.1.el6uek
kernel-uek-debug-devel
2.6.32-200.19.1.el6uek
kernel-uek-devel
2.6.32-200.19.1.el6uek
kernel-uek-doc
2.6.32-200.19.1.el6uek
kernel-uek-firmware
2.6.32-200.19.1.el6uek
kernel-uek-headers
2.6.32-200.19.1.el6uek
ofa-2.6.32-200.19.1.el6uek
1.5.1-4.0.47
ofa-2.6.32-200.19.1.el6uekdebug
1.5.1-4.0.47
Oracle Linux i686
kernel-uek
2.6.32-200.19.1.el6uek
kernel-uek-debug
2.6.32-200.19.1.el6uek
kernel-uek-debug-devel
2.6.32-200.19.1.el6uek
kernel-uek-devel
2.6.32-200.19.1.el6uek
kernel-uek-doc
2.6.32-200.19.1.el6uek
kernel-uek-firmware
2.6.32-200.19.1.el6uek
kernel-uek-headers
2.6.32-200.19.1.el6uek
ofa-2.6.32-200.19.1.el6uek
1.5.1-4.0.47
ofa-2.6.32-200.19.1.el6uekdebug
1.5.1-4.0.47
Ссылки на источники
Связанные уязвимости
ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...