Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0168

Опубликовано: 22 янв. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2013-0168: kernel security and bug fix update (MODERATE)

kernel [2.6.18-348.1.1]

  • [pci] intel-iommu: reduce max num of domains supported (Don Dutile) [886876 885125]
  • [fs] gfs2: Fix leak of cached directory hash table (Steven Whitehouse) [886124 831330]
  • [x86] mm: randomize SHLIB_BASE (Petr Matousek) [804953 804954] {CVE-2012-1568}
  • [net] be2net: create RSS rings even in multi-channel configs (Ivan Vecera) [884702 878209]
  • [net] tg3: Avoid dma read error (John Feeney) [885692 877474]
  • [misc] Fix unsupported hardware message (Prarit Bhargava) [885063 876587]
  • [net] ipv6: discard overlapping fragment (Jiri Pirko) [874837 874838] {CVE-2012-4444}
  • [usb] Fix serial port reference counting on hotplug remove (Don Zickus) [885700 845447]
  • [net] bridge: export its presence and fix bonding igmp reporting (Veaceslav Falico) [884742 843473]
  • [fs] nfs: move wait for server->active from put_super to kill_sb (Jeff Layton) [884708 839839]
  • [scsi] libfc: fix indefinite rport restart (Neil Horman) [884740 595184]
  • [scsi] libfc: Retry a rejected PRLI request (Neil Horman) [884740 595184]
  • [scsi] libfc: Fix remote port restart problem (Neil Horman) [884740 595184]
  • [xen] memop: limit guest specified extent order (Laszlo Ersek) [878449 878450] {CVE-2012-5515}
  • [xen] get bottom of EBDA from the multiboot data structure (Paolo Bonzini) [885062 881885]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-348.1.1.el5

kernel-debug

2.6.18-348.1.1.el5

kernel-debug-devel

2.6.18-348.1.1.el5

kernel-devel

2.6.18-348.1.1.el5

kernel-doc

2.6.18-348.1.1.el5

kernel-headers

2.6.18-348.1.1.el5

kernel-xen

2.6.18-348.1.1.el5

kernel-xen-devel

2.6.18-348.1.1.el5

ocfs2-2.6.18-348.1.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.1.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.1.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.1.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.1.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.1.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-348.1.1.el5

kernel-debug

2.6.18-348.1.1.el5

kernel-debug-devel

2.6.18-348.1.1.el5

kernel-devel

2.6.18-348.1.1.el5

kernel-doc

2.6.18-348.1.1.el5

kernel-headers

2.6.18-348.1.1.el5

kernel-xen

2.6.18-348.1.1.el5

kernel-xen-devel

2.6.18-348.1.1.el5

ocfs2-2.6.18-348.1.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.1.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.1.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.1.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.1.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.1.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-348.1.1.el5

kernel-PAE

2.6.18-348.1.1.el5

kernel-PAE-devel

2.6.18-348.1.1.el5

kernel-debug

2.6.18-348.1.1.el5

kernel-debug-devel

2.6.18-348.1.1.el5

kernel-devel

2.6.18-348.1.1.el5

kernel-doc

2.6.18-348.1.1.el5

kernel-headers

2.6.18-348.1.1.el5

kernel-xen

2.6.18-348.1.1.el5

kernel-xen-devel

2.6.18-348.1.1.el5

ocfs2-2.6.18-348.1.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.1.1.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-348.1.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.1.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.1.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.1.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-348.1.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.1.1.el5xen

2.0.5-1.el5

Связанные уязвимости

oracle-oval
больше 12 лет назад

ELSA-2013-0168-1: kernel security and bug fix update (MODERATE)

ubuntu
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

redhat
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

nvd
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

debian
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and ...

Уязвимость ELSA-2013-0168