Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0376

Опубликовано: 08 мар. 2012
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 5

Описание

ELSA-2012-0376: systemtap security update (MODERATE)

[1.6-5.0.1.el6_2]

  • remove doc/SystemTap_Beginners_Guide/en-US in tarball
  • comment bz683569.patch in specfile
  • remove buildtime dependency on package publican-redhat

[1.6-5]

  • CVE-2012-0875

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

systemtap

1.6-5.0.1.el6_2

systemtap-grapher

1.6-5.0.1.el6_2

systemtap-initscript

1.6-5.0.1.el6_2

systemtap-runtime

1.6-5.0.1.el6_2

systemtap-sdt-devel

1.6-5.0.1.el6_2

systemtap-server

1.6-5.0.1.el6_2

systemtap-testsuite

1.6-5.0.1.el6_2

Oracle Linux i686

systemtap

1.6-5.0.1.el6_2

systemtap-grapher

1.6-5.0.1.el6_2

systemtap-initscript

1.6-5.0.1.el6_2

systemtap-runtime

1.6-5.0.1.el6_2

systemtap-sdt-devel

1.6-5.0.1.el6_2

systemtap-server

1.6-5.0.1.el6_2

systemtap-testsuite

1.6-5.0.1.el6_2

Oracle Linux 5

Oracle Linux ia64

systemtap

1.6-7.el5_8

systemtap-initscript

1.6-7.el5_8

systemtap-runtime

1.6-7.el5_8

systemtap-sdt-devel

1.6-7.el5_8

systemtap-server

1.6-7.el5_8

systemtap-testsuite

1.6-7.el5_8

Oracle Linux x86_64

systemtap

1.6-7.el5_8

systemtap-initscript

1.6-7.el5_8

systemtap-runtime

1.6-7.el5_8

systemtap-sdt-devel

1.6-7.el5_8

systemtap-server

1.6-7.el5_8

systemtap-testsuite

1.6-7.el5_8

Oracle Linux i386

systemtap

1.6-7.el5_8

systemtap-initscript

1.6-7.el5_8

systemtap-runtime

1.6-7.el5_8

systemtap-sdt-devel

1.6-7.el5_8

systemtap-server

1.6-7.el5_8

systemtap-testsuite

1.6-7.el5_8

Связанные CVE

Связанные уязвимости

ubuntu
больше 11 лет назад

SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.

redhat
больше 13 лет назад

SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.

nvd
больше 11 лет назад

SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.

debian
больше 11 лет назад

SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged m ...

github
больше 3 лет назад

SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.