Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1323

Опубликовано: 02 окт. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-1323: kernel security and bug fix update (IMPORTANT)

kernel [2.6.18-308.16.1.el5]

  • Revert: [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]
  • Revert: [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]
  • Revert: [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]
  • Revert: [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]
  • Revert: [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]
  • Revert: [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]
  • Revert: [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
  • Revert: [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]
  • Revert: [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
  • Revert: [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]
  • Revert: [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]
  • Revert: [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]

[2.6.18-308.15.1.el5]

  • [net] sfc: Fix max no of TSO segments and min TX queue size (Michal Schmidt) [845554 845555] {CVE-2012-3412}
  • [kernel] xacct_add_tsk: fix pure theoretical ->mm use-after-free (Nikola Pajkovsky) [849723 849725] {CVE-2012-3510}
  • [fs] hfsplus: Buffer overflow in the HFS plus filesystem (Jacob Tanenbaum) [820255 820256] {CVE-2012-2319}
  • [net] netfilter: add dscp netfilter match (Thomas Graf) [847327 842029]
  • [net] rds: set correct msg_namelen (Weiping Pan) [822727 822728] {CVE-2012-3430}
  • [misc] ERESTARTNOINTR seen from fork call in userspace (Oleg Nesterov) [847359 693822]
  • [fs] quota: manage reserved space when quota is not active (Eric Sandeen) [847326 818087]
  • [fs] quota: Fix warning if delayed write before quota is enabled (Eric Sandeen) [847326 818087]
  • [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]
  • [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]
  • [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]
  • [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
  • [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]
  • [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
  • [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]
  • [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]
  • [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]
  • [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]
  • [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]
  • [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]
  • [xen] x86: whitelist Enhanced SpeedStep for dom0 (Laszlo Ersek) [846125 809103]

[2.6.18-308.14.1.el5]

  • [net] e1000e: drop check of RXCW.CW to eliminate link up and down (Dean Nelson) [852448 840642]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-308.16.1.el5

kernel-debug

2.6.18-308.16.1.el5

kernel-debug-devel

2.6.18-308.16.1.el5

kernel-devel

2.6.18-308.16.1.el5

kernel-doc

2.6.18-308.16.1.el5

kernel-headers

2.6.18-308.16.1.el5

kernel-xen

2.6.18-308.16.1.el5

kernel-xen-devel

2.6.18-308.16.1.el5

ocfs2-2.6.18-308.16.1.el5

1.4.10-1.el5

ocfs2-2.6.18-308.16.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-308.16.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-308.16.1.el5

2.0.5-1.el5

oracleasm-2.6.18-308.16.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-308.16.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-308.16.1.el5

kernel-debug

2.6.18-308.16.1.el5

kernel-debug-devel

2.6.18-308.16.1.el5

kernel-devel

2.6.18-308.16.1.el5

kernel-doc

2.6.18-308.16.1.el5

kernel-headers

2.6.18-308.16.1.el5

kernel-xen

2.6.18-308.16.1.el5

kernel-xen-devel

2.6.18-308.16.1.el5

ocfs2-2.6.18-308.16.1.el5

1.4.10-1.el5

ocfs2-2.6.18-308.16.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-308.16.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-308.16.1.el5

2.0.5-1.el5

oracleasm-2.6.18-308.16.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-308.16.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-308.16.1.el5

kernel-PAE

2.6.18-308.16.1.el5

kernel-PAE-devel

2.6.18-308.16.1.el5

kernel-debug

2.6.18-308.16.1.el5

kernel-debug-devel

2.6.18-308.16.1.el5

kernel-devel

2.6.18-308.16.1.el5

kernel-doc

2.6.18-308.16.1.el5

kernel-headers

2.6.18-308.16.1.el5

kernel-xen

2.6.18-308.16.1.el5

kernel-xen-devel

2.6.18-308.16.1.el5

ocfs2-2.6.18-308.16.1.el5

1.4.10-1.el5

ocfs2-2.6.18-308.16.1.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-308.16.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-308.16.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-308.16.1.el5

2.0.5-1.el5

oracleasm-2.6.18-308.16.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-308.16.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-308.16.1.el5xen

2.0.5-1.el5

Связанные уязвимости

oracle-oval
больше 12 лет назад

ELSA-2012-1323-1: kernel security and bug fix update (IMPORTANT)

ubuntu
больше 12 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

redhat
больше 18 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

nvd
больше 12 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

debian
больше 12 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/t ...