Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-2001

Опубликовано: 24 янв. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-2001: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

[2.6.32-300.7.1.el6uek]

  • Revert "proc: enable writing to /proc/pid/mem" [orabug 13619701] {CVE-2012-0056}
  • [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable (Suresh Siddha)

[2.6.32-300.6.1.el6uek]

  • tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov) [orabug 13611655]

[2.6.32-300.5.1.el6uek]

  • sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) [orabug 13604567]
  • [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin) [orabug 13492670]
  • drm/i915: Rephrase pwrite bounds checking to avoid any potential overflow (Chris Wilson) [CVE-2010-296]
  • x2apic: Enable the bios request for x2apic optout (Suresh Siddha) [orabug 13565303]
  • fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 10004611]
  • fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611]

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.32-300.7.1.el5uek

kernel-uek-debug

2.6.32-300.7.1.el5uek

kernel-uek-debug-devel

2.6.32-300.7.1.el5uek

kernel-uek-devel

2.6.32-300.7.1.el5uek

kernel-uek-doc

2.6.32-300.7.1.el5uek

kernel-uek-firmware

2.6.32-300.7.1.el5uek

kernel-uek-headers

2.6.32-300.7.1.el5uek

ofa-2.6.32-300.7.1.el5uek

1.5.1-4.0.53

ofa-2.6.32-300.7.1.el5uekdebug

1.5.1-4.0.53

Oracle Linux i386

kernel-uek

2.6.32-300.7.1.el5uek

kernel-uek-debug

2.6.32-300.7.1.el5uek

kernel-uek-debug-devel

2.6.32-300.7.1.el5uek

kernel-uek-devel

2.6.32-300.7.1.el5uek

kernel-uek-doc

2.6.32-300.7.1.el5uek

kernel-uek-firmware

2.6.32-300.7.1.el5uek

kernel-uek-headers

2.6.32-300.7.1.el5uek

ofa-2.6.32-300.7.1.el5uek

1.5.1-4.0.53

ofa-2.6.32-300.7.1.el5uekdebug

1.5.1-4.0.53

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-300.7.1.el6uek

kernel-uek-debug

2.6.32-300.7.1.el6uek

kernel-uek-debug-devel

2.6.32-300.7.1.el6uek

kernel-uek-devel

2.6.32-300.7.1.el6uek

kernel-uek-doc

2.6.32-300.7.1.el6uek

kernel-uek-firmware

2.6.32-300.7.1.el6uek

kernel-uek-headers

2.6.32-300.7.1.el6uek

mlnx_en-2.6.32-300.7.1.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.7.1.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.7.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-300.7.1.el6uekdebug

1.5.1-4.0.47

Oracle Linux i686

kernel-uek

2.6.32-300.7.1.el6uek

kernel-uek-debug

2.6.32-300.7.1.el6uek

kernel-uek-debug-devel

2.6.32-300.7.1.el6uek

kernel-uek-devel

2.6.32-300.7.1.el6uek

kernel-uek-doc

2.6.32-300.7.1.el6uek

kernel-uek-firmware

2.6.32-300.7.1.el6uek

kernel-uek-headers

2.6.32-300.7.1.el6uek

mlnx_en-2.6.32-300.7.1.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.7.1.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.7.1.el6uek

1.5.1-4.0.47

ofa-2.6.32-300.7.1.el6uekdebug

1.5.1-4.0.47

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

redhat
больше 13 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

nvd
больше 13 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

debian
больше 13 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is ...

ubuntu
больше 14 лет назад

drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.

Уязвимость ELSA-2012-2001