Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1061

Опубликовано: 10 июл. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-1061: kernel security and bug fix update (MODERATE)

[2.6.18-308.11.1.el5]

  • [net] ixgbe: remove flow director stats (Andy Gospodarek) [832169 830226]
  • [net] ixgbe: fix default return value for ixgbe_cache_ring_fdir (Andy Gospodarek) [832169 830226]
  • [net] ixgbe: reverting setup redirection table for multiple packet buffers (Andy Gospodarek) [832169 830226]

[2.6.18-308.10.1.el5]

  • [xen] x86_64: check address on trap handlers or guest callbacks (Paolo Bonzini) [813430 813431] {CVE-2012-0217}
  • [xen] x86_64: Do not execute sysret with a non-canonical return address (Paolo Bonzini) [813430 813431] {CVE-2012-0217}
  • [xen] x86: prevent hv boot on AMD CPUs with Erratum 121 (Laszlo Ersek) [824969 824970] {CVE-2012-2934}
  • [scsi] qla2xxx: Use ha->pdev->revision in 4Gbps MSI-X check. (Chad Dupuis) [816373 800653]
  • [fs] sunrpc: do array overrun check in svc_recv before page alloc (J. Bruce Fields) [820358 814626]
  • [fs] knfsd: fix an NFSD bug with full size non-page-aligned reads (J. Bruce Fields) [820358 814626]
  • [fs] sunrpc: fix oops due to overrunning server's page array (J. Bruce Fields) [820358 814626]
  • [fs] epoll: clear the tfile_check_list on -ELOOP (Jason Baron) [829670 817131]
  • [x86_64] sched: Avoid unnecessary overflow in sched_clock (Prarit Bhargava) [824654 818787]
  • [net] sunrpc: Don't use list_for_each_entry_safe in rpc_wake_up (Steve Dickson) [817571 809937]
  • [s390] qeth: add missing wake_up call (Hendrik Brueckner) [829059 790900]

[2.6.18-308.9.1.el5]

  • [fs] jbd: clear b_modified before moving the jh to a different transaction (Josef Bacik) [827205 563247]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-308.11.1.el5

kernel-debug

2.6.18-308.11.1.el5

kernel-debug-devel

2.6.18-308.11.1.el5

kernel-devel

2.6.18-308.11.1.el5

kernel-doc

2.6.18-308.11.1.el5

kernel-headers

2.6.18-308.11.1.el5

kernel-xen

2.6.18-308.11.1.el5

kernel-xen-devel

2.6.18-308.11.1.el5

ocfs2-2.6.18-308.11.1.el5

1.4.10-1.el5

ocfs2-2.6.18-308.11.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-308.11.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-308.11.1.el5

2.0.5-1.el5

oracleasm-2.6.18-308.11.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-308.11.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-308.11.1.el5

kernel-debug

2.6.18-308.11.1.el5

kernel-debug-devel

2.6.18-308.11.1.el5

kernel-devel

2.6.18-308.11.1.el5

kernel-doc

2.6.18-308.11.1.el5

kernel-headers

2.6.18-308.11.1.el5

kernel-xen

2.6.18-308.11.1.el5

kernel-xen-devel

2.6.18-308.11.1.el5

ocfs2-2.6.18-308.11.1.el5

1.4.10-1.el5

ocfs2-2.6.18-308.11.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-308.11.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-308.11.1.el5

2.0.5-1.el5

oracleasm-2.6.18-308.11.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-308.11.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-308.11.1.el5

kernel-PAE

2.6.18-308.11.1.el5

kernel-PAE-devel

2.6.18-308.11.1.el5

kernel-debug

2.6.18-308.11.1.el5

kernel-debug-devel

2.6.18-308.11.1.el5

kernel-devel

2.6.18-308.11.1.el5

kernel-doc

2.6.18-308.11.1.el5

kernel-headers

2.6.18-308.11.1.el5

kernel-xen

2.6.18-308.11.1.el5

kernel-xen-devel

2.6.18-308.11.1.el5

ocfs2-2.6.18-308.11.1.el5

1.4.10-1.el5

ocfs2-2.6.18-308.11.1.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-308.11.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-308.11.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-308.11.1.el5

2.0.5-1.el5

oracleasm-2.6.18-308.11.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-308.11.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-308.11.1.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
почти 13 лет назад

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.

redhat
больше 13 лет назад

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.

nvd
почти 13 лет назад

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.

debian
почти 13 лет назад

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before ...

github
больше 3 лет назад

The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.