Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-2020

Опубликовано: 19 июн. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-2020: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

kernel-uek:

[2.6.32-300.27.1.el6uek]

  • net: sock: validate data_len before allocating skb (Jason Wang) [Bugdb: 13966]{CVE-2012-2136}
  • fcaps: clear the same personality flags as suid when fcaps are used (Eric Paris) [Bugdb: 13966] {CVE-2012-2123}
  • Revert 'nfs: when attempting to open a directory, fall back on normal lookup (Todd Vierling) [Orabug 14141154]

[2.6.32-300.26.1.el6uek]

  • mptsas: do not call __mptsas_probe in kthread (Maxim Uvarov) [Orabug: 14175509]
  • mm: check if any page in a pageblock is reserved before marking it MIGRATE_RESERVE (Maxim Uvarov) [Orabug: 14073214]
  • mm: reduce the amount of work done when updating min_free_kbytes (Mel Gorman) [Orabug: 14073214]
  • vmxnet3: Updated to el6-u2 (Guangyu Sun) [Orabug: 14027961]
  • xen: expose host uuid via sysfs. (Zhigang Wang)
  • sched: Fix cgroup movement of waking process (Daisuke Nishimura) [Orabug: 13946210]
  • sched: Fix cgroup movement of newly created process (Daisuke Nishimura) [Orabug: 13946210]
  • sched: Fix cgroup movement of forking process (Daisuke Nishimura) [Orabug: 13946210]
  • x86, boot: Wait for boot cpu to show up if nr_cpus limit is about to hit (Zhenzhong Duan) [Orabug: 13629087]
  • smp: Use nr_cpus= to set nr_cpu_ids early (Zhenzhong Duan) [Orabug: 13629087]
  • net: ipv4: relax AF_INET check in bind() (Maxim Uvarov) [Orabug: 14054411]

ofa-2.6.32-300.27.1.el6uek:

[1.5.1-4.0.58]

  • Add Patch 158-169

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.32-300.27.1.el5uek

kernel-uek-debug

2.6.32-300.27.1.el5uek

kernel-uek-debug-devel

2.6.32-300.27.1.el5uek

kernel-uek-devel

2.6.32-300.27.1.el5uek

kernel-uek-doc

2.6.32-300.27.1.el5uek

kernel-uek-firmware

2.6.32-300.27.1.el5uek

kernel-uek-headers

2.6.32-300.27.1.el5uek

mlnx_en-2.6.32-300.27.1.el5uek

1.5.7-2

mlnx_en-2.6.32-300.27.1.el5uekdebug

1.5.7-2

ofa-2.6.32-300.27.1.el5uek

1.5.1-4.0.58

ofa-2.6.32-300.27.1.el5uekdebug

1.5.1-4.0.58

Oracle Linux i386

kernel-uek

2.6.32-300.27.1.el5uek

kernel-uek-debug

2.6.32-300.27.1.el5uek

kernel-uek-debug-devel

2.6.32-300.27.1.el5uek

kernel-uek-devel

2.6.32-300.27.1.el5uek

kernel-uek-doc

2.6.32-300.27.1.el5uek

kernel-uek-firmware

2.6.32-300.27.1.el5uek

kernel-uek-headers

2.6.32-300.27.1.el5uek

mlnx_en-2.6.32-300.27.1.el5uek

1.5.7-2

mlnx_en-2.6.32-300.27.1.el5uekdebug

1.5.7-2

ofa-2.6.32-300.27.1.el5uek

1.5.1-4.0.58

ofa-2.6.32-300.27.1.el5uekdebug

1.5.1-4.0.58

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-300.27.1.el6uek

kernel-uek-debug

2.6.32-300.27.1.el6uek

kernel-uek-debug-devel

2.6.32-300.27.1.el6uek

kernel-uek-devel

2.6.32-300.27.1.el6uek

kernel-uek-doc

2.6.32-300.27.1.el6uek

kernel-uek-firmware

2.6.32-300.27.1.el6uek

kernel-uek-headers

2.6.32-300.27.1.el6uek

mlnx_en-2.6.32-300.27.1.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.27.1.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.27.1.el6uek

1.5.1-4.0.58

ofa-2.6.32-300.27.1.el6uekdebug

1.5.1-4.0.58

Oracle Linux i686

kernel-uek

2.6.32-300.27.1.el6uek

kernel-uek-debug

2.6.32-300.27.1.el6uek

kernel-uek-debug-devel

2.6.32-300.27.1.el6uek

kernel-uek-devel

2.6.32-300.27.1.el6uek

kernel-uek-doc

2.6.32-300.27.1.el6uek

kernel-uek-firmware

2.6.32-300.27.1.el6uek

kernel-uek-headers

2.6.32-300.27.1.el6uek

mlnx_en-2.6.32-300.27.1.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.27.1.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.27.1.el6uek

1.5.1-4.0.58

ofa-2.6.32-300.27.1.el6uekdebug

1.5.1-4.0.58

Связанные CVE

Связанные уязвимости

oracle-oval
около 13 лет назад

ELSA-2012-0743: kernel security and bug fix update (IMPORTANT)

ubuntu
около 13 лет назад

The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.

redhat
около 13 лет назад

The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.

nvd
около 13 лет назад

The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.

debian
около 13 лет назад

The cap_bprm_set_creds function in security/commoncap.c in the Linux k ...