Описание
ELSA-2012-0312: initscripts security and bug fix update (LOW)
[8.45.42-1.0.1.el5]
- Update oracle-enterprise.patch to do detection on /etc/oracle-release and /etc/enterprise-release
- Patch x86_64 sysctl.conf as well as default sysctl.conf
- Patch sysctl.conf to default rp_filter to loose reverse path filtering (has no effect for pre-2.6.32 kernels) [orabug 10286227]
- Move hwclock into udev rules
- Update oracle-enterprise.patch to fix RedHat references in arch specific sysctl.conf files in source tarball
- Add oracle-enterprise.patch and update specfile
- Don't attempt to re-enslave already-enslaved devices (#455537) (pknirsch@redhat.com)
[8.45.42-1]
- changed exchange_mode to 'main, aggressive' (#435274)
[8.45.41-1]
- fix check for dhcp6c pid (#568896)
[8.45.40-1]
- exit arping on first response (#744734)
[8.45.39-1]
- suppress remove error message during boot (#679998)
- fix logic error with removing arp_ip_target (#745681)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
initscripts
8.45.42-1.0.1.el5
Oracle Linux x86_64
initscripts
8.45.42-1.0.1.el5
Oracle Linux i386
initscripts
8.45.42-1.0.1.el5
Связанные CVE
Связанные уязвимости
The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.
The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.
The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.
The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.