Описание
ELSA-2011-2033: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.32-200.23.1.el6uek]
- net: Remove atmclip.h to prevent break kabi check.
- KConfig: add CONFIG_UEK5=n to ol6/config-generic
[2.6.32-200.22.1.el6uek]
- ipv6: make fragment identifications less predictable (Joe Jin) {CVE-2011-2699}
- vlan: fix panic when handling priority tagged frames (Joe Jin) {CVE-2011-3593}
- ipv6: udp: fix the wrong headroom check (Maxim Uvarov) {CVE-2011-4326}
- b43: allocate receive buffers big enough for max frame len + offset (Maxim Uvarov) {CVE-2011-3359}
- fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message (Maxim Uvarov) {CVE-2011-3353}
- cifs: fix possible memory corruption in CIFSFindNext (Maxim Uvarov) {CVE-2011-3191}
- crypto: md5 - Add export support (Maxim Uvarov) {CVE-2011-2699}
- fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops (Maxim Uvarov) {CVE-2011-1577}
- block: use struct parsed_partitions *state universally in partition check code (Maxim Uvarov)
- net: Compute protocol sequence numbers and fragment IDs using MD5. (Maxim Uvarov) {CVE-2011-3188}
- crypto: Move md5_transform to lib/md5.c (Maxim Uvarov) {CVE-2011-3188}
- perf tools: do not look at ./config for configuration (Maxim Uvarov) {CVE-2011-2905}
- Make TASKSTATS require root access (Maxim Uvarov) {CVE-2011-2494}
- TPM: Zero buffer after copying to userspace (Maxim Uvarov) {CVE-2011-1162}
- TPM: Call tpm_transmit with correct size (Maxim Uvarov){CVE-2011-1161}
- fnic: fix panic while booting in fnic(Xiaowei Hu)
- Revert 'PCI hotplug: acpiphp: set current_state to D0 in register_slot' (Guru Anbalagane)
- xen: drop xen_sched_clock in favour of using plain wallclock time (Jeremy Fitzhardinge)
[2.6.32-200.21.1.el6uek]
- PCI: Set device power state to PCI_D0 for device without native PM support (Ajaykumar Hotchandani) [orabug 13033435]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-200.23.1.el5uek
kernel-uek-debug
2.6.32-200.23.1.el5uek
kernel-uek-debug-devel
2.6.32-200.23.1.el5uek
kernel-uek-devel
2.6.32-200.23.1.el5uek
kernel-uek-doc
2.6.32-200.23.1.el5uek
kernel-uek-firmware
2.6.32-200.23.1.el5uek
kernel-uek-headers
2.6.32-200.23.1.el5uek
ofa-2.6.32-200.23.1.el5uek
1.5.1-4.0.53
ofa-2.6.32-200.23.1.el5uekdebug
1.5.1-4.0.53
Oracle Linux i386
kernel-uek
2.6.32-200.23.1.el5uek
kernel-uek-debug
2.6.32-200.23.1.el5uek
kernel-uek-debug-devel
2.6.32-200.23.1.el5uek
kernel-uek-devel
2.6.32-200.23.1.el5uek
kernel-uek-doc
2.6.32-200.23.1.el5uek
kernel-uek-firmware
2.6.32-200.23.1.el5uek
kernel-uek-headers
2.6.32-200.23.1.el5uek
ofa-2.6.32-200.23.1.el5uek
1.5.1-4.0.53
ofa-2.6.32-200.23.1.el5uekdebug
1.5.1-4.0.53
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-200.23.1.el6uek
kernel-uek-debug
2.6.32-200.23.1.el6uek
kernel-uek-debug-devel
2.6.32-200.23.1.el6uek
kernel-uek-devel
2.6.32-200.23.1.el6uek
kernel-uek-doc
2.6.32-200.23.1.el6uek
kernel-uek-firmware
2.6.32-200.23.1.el6uek
kernel-uek-headers
2.6.32-200.23.1.el6uek
ofa-2.6.32-200.23.1.el6uek
1.5.1-4.0.47
ofa-2.6.32-200.23.1.el6uekdebug
1.5.1-4.0.47
Oracle Linux i686
kernel-uek
2.6.32-200.23.1.el6uek
kernel-uek-debug
2.6.32-200.23.1.el6uek
kernel-uek-debug-devel
2.6.32-200.23.1.el6uek
kernel-uek-devel
2.6.32-200.23.1.el6uek
kernel-uek-doc
2.6.32-200.23.1.el6uek
kernel-uek-firmware
2.6.32-200.23.1.el6uek
kernel-uek-headers
2.6.32-200.23.1.el6uek
ofa-2.6.32-200.23.1.el6uek
1.5.1-4.0.47
ofa-2.6.32-200.23.1.el6uekdebug
1.5.1-4.0.47
Ссылки на источники
Связанные уязвимости
ELSA-2011-1465: kernel security and bug fix update (IMPORTANT)
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
Heap-based buffer overflow in the is_gpt_valid function in fs/partitio ...