Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-2033

Опубликовано: 25 нояб. 2011
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2011-2033: Unbreakable Enterprise kernel security update (IMPORTANT)

[2.6.32-200.23.1.el6uek]

  • net: Remove atmclip.h to prevent break kabi check.
  • KConfig: add CONFIG_UEK5=n to ol6/config-generic

[2.6.32-200.22.1.el6uek]

  • ipv6: make fragment identifications less predictable (Joe Jin) {CVE-2011-2699}
  • vlan: fix panic when handling priority tagged frames (Joe Jin) {CVE-2011-3593}
  • ipv6: udp: fix the wrong headroom check (Maxim Uvarov) {CVE-2011-4326}
  • b43: allocate receive buffers big enough for max frame len + offset (Maxim Uvarov) {CVE-2011-3359}
  • fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message (Maxim Uvarov) {CVE-2011-3353}
  • cifs: fix possible memory corruption in CIFSFindNext (Maxim Uvarov) {CVE-2011-3191}
  • crypto: md5 - Add export support (Maxim Uvarov) {CVE-2011-2699}
  • fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops (Maxim Uvarov) {CVE-2011-1577}
  • block: use struct parsed_partitions *state universally in partition check code (Maxim Uvarov)
  • net: Compute protocol sequence numbers and fragment IDs using MD5. (Maxim Uvarov) {CVE-2011-3188}
  • crypto: Move md5_transform to lib/md5.c (Maxim Uvarov) {CVE-2011-3188}
  • perf tools: do not look at ./config for configuration (Maxim Uvarov) {CVE-2011-2905}
  • Make TASKSTATS require root access (Maxim Uvarov) {CVE-2011-2494}
  • TPM: Zero buffer after copying to userspace (Maxim Uvarov) {CVE-2011-1162}
  • TPM: Call tpm_transmit with correct size (Maxim Uvarov){CVE-2011-1161}
  • fnic: fix panic while booting in fnic(Xiaowei Hu)
  • Revert 'PCI hotplug: acpiphp: set current_state to D0 in register_slot' (Guru Anbalagane)
  • xen: drop xen_sched_clock in favour of using plain wallclock time (Jeremy Fitzhardinge)

[2.6.32-200.21.1.el6uek]

  • PCI: Set device power state to PCI_D0 for device without native PM support (Ajaykumar Hotchandani) [orabug 13033435]

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.32-200.23.1.el5uek

kernel-uek-debug

2.6.32-200.23.1.el5uek

kernel-uek-debug-devel

2.6.32-200.23.1.el5uek

kernel-uek-devel

2.6.32-200.23.1.el5uek

kernel-uek-doc

2.6.32-200.23.1.el5uek

kernel-uek-firmware

2.6.32-200.23.1.el5uek

kernel-uek-headers

2.6.32-200.23.1.el5uek

ofa-2.6.32-200.23.1.el5uek

1.5.1-4.0.53

ofa-2.6.32-200.23.1.el5uekdebug

1.5.1-4.0.53

Oracle Linux i386

kernel-uek

2.6.32-200.23.1.el5uek

kernel-uek-debug

2.6.32-200.23.1.el5uek

kernel-uek-debug-devel

2.6.32-200.23.1.el5uek

kernel-uek-devel

2.6.32-200.23.1.el5uek

kernel-uek-doc

2.6.32-200.23.1.el5uek

kernel-uek-firmware

2.6.32-200.23.1.el5uek

kernel-uek-headers

2.6.32-200.23.1.el5uek

ofa-2.6.32-200.23.1.el5uek

1.5.1-4.0.53

ofa-2.6.32-200.23.1.el5uekdebug

1.5.1-4.0.53

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-200.23.1.el6uek

kernel-uek-debug

2.6.32-200.23.1.el6uek

kernel-uek-debug-devel

2.6.32-200.23.1.el6uek

kernel-uek-devel

2.6.32-200.23.1.el6uek

kernel-uek-doc

2.6.32-200.23.1.el6uek

kernel-uek-firmware

2.6.32-200.23.1.el6uek

kernel-uek-headers

2.6.32-200.23.1.el6uek

ofa-2.6.32-200.23.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-200.23.1.el6uekdebug

1.5.1-4.0.47

Oracle Linux i686

kernel-uek

2.6.32-200.23.1.el6uek

kernel-uek-debug

2.6.32-200.23.1.el6uek

kernel-uek-debug-devel

2.6.32-200.23.1.el6uek

kernel-uek-devel

2.6.32-200.23.1.el6uek

kernel-uek-doc

2.6.32-200.23.1.el6uek

kernel-uek-firmware

2.6.32-200.23.1.el6uek

kernel-uek-headers

2.6.32-200.23.1.el6uek

ofa-2.6.32-200.23.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-200.23.1.el6uekdebug

1.5.1-4.0.47

Связанные уязвимости

oracle-oval
больше 13 лет назад

ELSA-2011-1465: kernel security and bug fix update (IMPORTANT)

ubuntu
около 14 лет назад

Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.

redhat
около 14 лет назад

Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.

nvd
около 14 лет назад

Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.

debian
около 14 лет назад

Heap-based buffer overflow in the is_gpt_valid function in fs/partitio ...