Описание
ELSA-2012-2001: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)
[2.6.32-300.7.1.el6uek]
- Revert "proc: enable writing to /proc/pid/mem" [orabug 13619701] {CVE-2012-0056}
- [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable (Suresh Siddha)
[2.6.32-300.6.1.el6uek]
- tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov) [orabug 13611655]
[2.6.32-300.5.1.el6uek]
- sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) [orabug 13604567]
- [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin) [orabug 13492670]
- drm/i915: Rephrase pwrite bounds checking to avoid any potential overflow (Chris Wilson) [CVE-2010-296]
- x2apic: Enable the bios request for x2apic optout (Suresh Siddha) [orabug 13565303]
- fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 10004611]
- fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-300.7.1.el5uek
kernel-uek-debug
2.6.32-300.7.1.el5uek
kernel-uek-debug-devel
2.6.32-300.7.1.el5uek
kernel-uek-devel
2.6.32-300.7.1.el5uek
kernel-uek-doc
2.6.32-300.7.1.el5uek
kernel-uek-firmware
2.6.32-300.7.1.el5uek
kernel-uek-headers
2.6.32-300.7.1.el5uek
ofa-2.6.32-300.7.1.el5uek
1.5.1-4.0.53
ofa-2.6.32-300.7.1.el5uekdebug
1.5.1-4.0.53
Oracle Linux i386
kernel-uek
2.6.32-300.7.1.el5uek
kernel-uek-debug
2.6.32-300.7.1.el5uek
kernel-uek-debug-devel
2.6.32-300.7.1.el5uek
kernel-uek-devel
2.6.32-300.7.1.el5uek
kernel-uek-doc
2.6.32-300.7.1.el5uek
kernel-uek-firmware
2.6.32-300.7.1.el5uek
kernel-uek-headers
2.6.32-300.7.1.el5uek
ofa-2.6.32-300.7.1.el5uek
1.5.1-4.0.53
ofa-2.6.32-300.7.1.el5uekdebug
1.5.1-4.0.53
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-300.7.1.el6uek
kernel-uek-debug
2.6.32-300.7.1.el6uek
kernel-uek-debug-devel
2.6.32-300.7.1.el6uek
kernel-uek-devel
2.6.32-300.7.1.el6uek
kernel-uek-doc
2.6.32-300.7.1.el6uek
kernel-uek-firmware
2.6.32-300.7.1.el6uek
kernel-uek-headers
2.6.32-300.7.1.el6uek
mlnx_en-2.6.32-300.7.1.el6uek
1.5.7-0.1
mlnx_en-2.6.32-300.7.1.el6uekdebug
1.5.7-0.1
ofa-2.6.32-300.7.1.el6uek
1.5.1-4.0.47
ofa-2.6.32-300.7.1.el6uekdebug
1.5.1-4.0.47
Oracle Linux i686
kernel-uek
2.6.32-300.7.1.el6uek
kernel-uek-debug
2.6.32-300.7.1.el6uek
kernel-uek-debug-devel
2.6.32-300.7.1.el6uek
kernel-uek-devel
2.6.32-300.7.1.el6uek
kernel-uek-doc
2.6.32-300.7.1.el6uek
kernel-uek-firmware
2.6.32-300.7.1.el6uek
kernel-uek-headers
2.6.32-300.7.1.el6uek
mlnx_en-2.6.32-300.7.1.el6uek
1.5.7-0.1
mlnx_en-2.6.32-300.7.1.el6uekdebug
1.5.7-0.1
ofa-2.6.32-300.7.1.el6uek
1.5.1-4.0.47
ofa-2.6.32-300.7.1.el6uekdebug
1.5.1-4.0.47
Связанные CVE
Связанные уязвимости
The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
The mem_write function in the Linux kernel before 3.2.2, when ASLR is ...
drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.