Описание
ELSA-2012-1323: kernel security and bug fix update (IMPORTANT)
kernel [2.6.18-308.16.1.el5]
- Revert: [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]
- Revert: [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]
- Revert: [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]
- Revert: [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]
- Revert: [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]
- Revert: [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]
- Revert: [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
- Revert: [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]
- Revert: [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
- Revert: [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]
- Revert: [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]
- Revert: [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]
[2.6.18-308.15.1.el5]
- [net] sfc: Fix max no of TSO segments and min TX queue size (Michal Schmidt) [845554 845555] {CVE-2012-3412}
- [kernel] xacct_add_tsk: fix pure theoretical ->mm use-after-free (Nikola Pajkovsky) [849723 849725] {CVE-2012-3510}
- [fs] hfsplus: Buffer overflow in the HFS plus filesystem (Jacob Tanenbaum) [820255 820256] {CVE-2012-2319}
- [net] netfilter: add dscp netfilter match (Thomas Graf) [847327 842029]
- [net] rds: set correct msg_namelen (Weiping Pan) [822727 822728] {CVE-2012-3430}
- [misc] ERESTARTNOINTR seen from fork call in userspace (Oleg Nesterov) [847359 693822]
- [fs] quota: manage reserved space when quota is not active (Eric Sandeen) [847326 818087]
- [fs] quota: Fix warning if delayed write before quota is enabled (Eric Sandeen) [847326 818087]
- [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]
- [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]
- [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]
- [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
- [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]
- [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]
- [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]
- [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]
- [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]
- [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]
- [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]
- [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]
- [xen] x86: whitelist Enhanced SpeedStep for dom0 (Laszlo Ersek) [846125 809103]
[2.6.18-308.14.1.el5]
- [net] e1000e: drop check of RXCW.CW to eliminate link up and down (Dean Nelson) [852448 840642]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-308.16.1.el5
kernel-debug
2.6.18-308.16.1.el5
kernel-debug-devel
2.6.18-308.16.1.el5
kernel-devel
2.6.18-308.16.1.el5
kernel-doc
2.6.18-308.16.1.el5
kernel-headers
2.6.18-308.16.1.el5
kernel-xen
2.6.18-308.16.1.el5
kernel-xen-devel
2.6.18-308.16.1.el5
ocfs2-2.6.18-308.16.1.el5
1.4.10-1.el5
ocfs2-2.6.18-308.16.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-308.16.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-308.16.1.el5
2.0.5-1.el5
oracleasm-2.6.18-308.16.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-308.16.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-308.16.1.el5
kernel-debug
2.6.18-308.16.1.el5
kernel-debug-devel
2.6.18-308.16.1.el5
kernel-devel
2.6.18-308.16.1.el5
kernel-doc
2.6.18-308.16.1.el5
kernel-headers
2.6.18-308.16.1.el5
kernel-xen
2.6.18-308.16.1.el5
kernel-xen-devel
2.6.18-308.16.1.el5
ocfs2-2.6.18-308.16.1.el5
1.4.10-1.el5
ocfs2-2.6.18-308.16.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-308.16.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-308.16.1.el5
2.0.5-1.el5
oracleasm-2.6.18-308.16.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-308.16.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-308.16.1.el5
kernel-PAE
2.6.18-308.16.1.el5
kernel-PAE-devel
2.6.18-308.16.1.el5
kernel-debug
2.6.18-308.16.1.el5
kernel-debug-devel
2.6.18-308.16.1.el5
kernel-devel
2.6.18-308.16.1.el5
kernel-doc
2.6.18-308.16.1.el5
kernel-headers
2.6.18-308.16.1.el5
kernel-xen
2.6.18-308.16.1.el5
kernel-xen-devel
2.6.18-308.16.1.el5
ocfs2-2.6.18-308.16.1.el5
1.4.10-1.el5
ocfs2-2.6.18-308.16.1.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-308.16.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-308.16.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-308.16.1.el5
2.0.5-1.el5
oracleasm-2.6.18-308.16.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-308.16.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-308.16.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
ELSA-2012-1323-1: kernel security and bug fix update (IMPORTANT)
Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.
Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.
Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.
Use-after-free vulnerability in the xacct_add_tsk function in kernel/t ...