Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-2026

Опубликовано: 17 июл. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-2026: Unbreakable Enterprise kernel Security update (IMPORTANT)

[2.6.32-300.29.2]

  • epoll: epoll_wait() should not use timespec_add_ns() (Eric Dumazet)
  • epoll: clear the tfile_check_list on -ELOOP (Joe Jin) {CVE-2012-3375}
  • Don't limit non-nested epoll paths (Jason Baron)
  • epoll: kabi fixups for epoll limit wakeup paths (Joe Jin) {CVE-2011-1083}
  • epoll: limit paths (Jason Baron) {CVE-2011-1083}
  • eventpoll: fix comment typo 'evenpoll' (Paul Bolle)
  • epoll: fix compiler warning and optimize the non-blocking path (Shawn Bohrer)
  • epoll: move ready event check into proper inline (Davide Libenzi)
  • epoll: make epoll_wait() use the hrtimer range feature (Shawn Bohrer)
  • select: rename estimate_accuracy() to select_estimate_accuracy() (Andrew Morton)
  • cred: copy_process() should clear child->replacement_session_keyring (Oleg Nesterov) {CVE-2012-2745}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.32-300.29.2.el5uek

kernel-uek-debug

2.6.32-300.29.2.el5uek

kernel-uek-debug-devel

2.6.32-300.29.2.el5uek

kernel-uek-devel

2.6.32-300.29.2.el5uek

kernel-uek-doc

2.6.32-300.29.2.el5uek

kernel-uek-firmware

2.6.32-300.29.2.el5uek

kernel-uek-headers

2.6.32-300.29.2.el5uek

mlnx_en-2.6.32-300.29.2.el5uek

1.5.7-2

mlnx_en-2.6.32-300.29.2.el5uekdebug

1.5.7-2

ofa-2.6.32-300.29.2.el5uek

1.5.1-4.0.58

ofa-2.6.32-300.29.2.el5uekdebug

1.5.1-4.0.58

Oracle Linux i386

kernel-uek

2.6.32-300.29.2.el5uek

kernel-uek-debug

2.6.32-300.29.2.el5uek

kernel-uek-debug-devel

2.6.32-300.29.2.el5uek

kernel-uek-devel

2.6.32-300.29.2.el5uek

kernel-uek-doc

2.6.32-300.29.2.el5uek

kernel-uek-firmware

2.6.32-300.29.2.el5uek

kernel-uek-headers

2.6.32-300.29.2.el5uek

mlnx_en-2.6.32-300.29.2.el5uek

1.5.7-2

mlnx_en-2.6.32-300.29.2.el5uekdebug

1.5.7-2

ofa-2.6.32-300.29.2.el5uek

1.5.1-4.0.58

ofa-2.6.32-300.29.2.el5uekdebug

1.5.1-4.0.58

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-300.29.2.el6uek

kernel-uek-debug

2.6.32-300.29.2.el6uek

kernel-uek-debug-devel

2.6.32-300.29.2.el6uek

kernel-uek-devel

2.6.32-300.29.2.el6uek

kernel-uek-doc

2.6.32-300.29.2.el6uek

kernel-uek-firmware

2.6.32-300.29.2.el6uek

kernel-uek-headers

2.6.32-300.29.2.el6uek

mlnx_en-2.6.32-300.29.2.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.29.2.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.29.2.el6uek

1.5.1-4.0.58

ofa-2.6.32-300.29.2.el6uekdebug

1.5.1-4.0.58

Oracle Linux i686

kernel-uek

2.6.32-300.29.2.el6uek

kernel-uek-debug

2.6.32-300.29.2.el6uek

kernel-uek-debug-devel

2.6.32-300.29.2.el6uek

kernel-uek-devel

2.6.32-300.29.2.el6uek

kernel-uek-doc

2.6.32-300.29.2.el6uek

kernel-uek-firmware

2.6.32-300.29.2.el6uek

kernel-uek-headers

2.6.32-300.29.2.el6uek

mlnx_en-2.6.32-300.29.2.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.29.2.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.29.2.el6uek

1.5.1-4.0.58

ofa-2.6.32-300.29.2.el6uekdebug

1.5.1-4.0.58

Связанные уязвимости

ubuntu
больше 14 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

redhat
больше 14 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

nvd
больше 14 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

debian
больше 14 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does ...

github
больше 3 лет назад

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.