Описание
ELSA-2012-2020: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)
kernel-uek:
[2.6.32-300.27.1.el6uek]
- net: sock: validate data_len before allocating skb (Jason Wang) [Bugdb: 13966]{CVE-2012-2136}
- fcaps: clear the same personality flags as suid when fcaps are used (Eric Paris) [Bugdb: 13966] {CVE-2012-2123}
- Revert 'nfs: when attempting to open a directory, fall back on normal lookup (Todd Vierling) [Orabug 14141154]
[2.6.32-300.26.1.el6uek]
- mptsas: do not call __mptsas_probe in kthread (Maxim Uvarov) [Orabug: 14175509]
- mm: check if any page in a pageblock is reserved before marking it MIGRATE_RESERVE (Maxim Uvarov) [Orabug: 14073214]
- mm: reduce the amount of work done when updating min_free_kbytes (Mel Gorman) [Orabug: 14073214]
- vmxnet3: Updated to el6-u2 (Guangyu Sun) [Orabug: 14027961]
- xen: expose host uuid via sysfs. (Zhigang Wang)
- sched: Fix cgroup movement of waking process (Daisuke Nishimura) [Orabug: 13946210]
- sched: Fix cgroup movement of newly created process (Daisuke Nishimura) [Orabug: 13946210]
- sched: Fix cgroup movement of forking process (Daisuke Nishimura) [Orabug: 13946210]
- x86, boot: Wait for boot cpu to show up if nr_cpus limit is about to hit (Zhenzhong Duan) [Orabug: 13629087]
- smp: Use nr_cpus= to set nr_cpu_ids early (Zhenzhong Duan) [Orabug: 13629087]
- net: ipv4: relax AF_INET check in bind() (Maxim Uvarov) [Orabug: 14054411]
ofa-2.6.32-300.27.1.el6uek:
[1.5.1-4.0.58]
- Add Patch 158-169
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-300.27.1.el5uek
kernel-uek-debug
2.6.32-300.27.1.el5uek
kernel-uek-debug-devel
2.6.32-300.27.1.el5uek
kernel-uek-devel
2.6.32-300.27.1.el5uek
kernel-uek-doc
2.6.32-300.27.1.el5uek
kernel-uek-firmware
2.6.32-300.27.1.el5uek
kernel-uek-headers
2.6.32-300.27.1.el5uek
mlnx_en-2.6.32-300.27.1.el5uek
1.5.7-2
mlnx_en-2.6.32-300.27.1.el5uekdebug
1.5.7-2
ofa-2.6.32-300.27.1.el5uek
1.5.1-4.0.58
ofa-2.6.32-300.27.1.el5uekdebug
1.5.1-4.0.58
Oracle Linux i386
kernel-uek
2.6.32-300.27.1.el5uek
kernel-uek-debug
2.6.32-300.27.1.el5uek
kernel-uek-debug-devel
2.6.32-300.27.1.el5uek
kernel-uek-devel
2.6.32-300.27.1.el5uek
kernel-uek-doc
2.6.32-300.27.1.el5uek
kernel-uek-firmware
2.6.32-300.27.1.el5uek
kernel-uek-headers
2.6.32-300.27.1.el5uek
mlnx_en-2.6.32-300.27.1.el5uek
1.5.7-2
mlnx_en-2.6.32-300.27.1.el5uekdebug
1.5.7-2
ofa-2.6.32-300.27.1.el5uek
1.5.1-4.0.58
ofa-2.6.32-300.27.1.el5uekdebug
1.5.1-4.0.58
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-300.27.1.el6uek
kernel-uek-debug
2.6.32-300.27.1.el6uek
kernel-uek-debug-devel
2.6.32-300.27.1.el6uek
kernel-uek-devel
2.6.32-300.27.1.el6uek
kernel-uek-doc
2.6.32-300.27.1.el6uek
kernel-uek-firmware
2.6.32-300.27.1.el6uek
kernel-uek-headers
2.6.32-300.27.1.el6uek
mlnx_en-2.6.32-300.27.1.el6uek
1.5.7-0.1
mlnx_en-2.6.32-300.27.1.el6uekdebug
1.5.7-0.1
ofa-2.6.32-300.27.1.el6uek
1.5.1-4.0.58
ofa-2.6.32-300.27.1.el6uekdebug
1.5.1-4.0.58
Oracle Linux i686
kernel-uek
2.6.32-300.27.1.el6uek
kernel-uek-debug
2.6.32-300.27.1.el6uek
kernel-uek-debug-devel
2.6.32-300.27.1.el6uek
kernel-uek-devel
2.6.32-300.27.1.el6uek
kernel-uek-doc
2.6.32-300.27.1.el6uek
kernel-uek-firmware
2.6.32-300.27.1.el6uek
kernel-uek-headers
2.6.32-300.27.1.el6uek
mlnx_en-2.6.32-300.27.1.el6uek
1.5.7-0.1
mlnx_en-2.6.32-300.27.1.el6uekdebug
1.5.7-0.1
ofa-2.6.32-300.27.1.el6uek
1.5.1-4.0.58
ofa-2.6.32-300.27.1.el6uekdebug
1.5.1-4.0.58
Связанные CVE
Связанные уязвимости
ELSA-2012-0743: kernel security and bug fix update (IMPORTANT)
The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.
The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.
The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.
The cap_bprm_set_creds function in security/commoncap.c in the Linux k ...