Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0847

Опубликовано: 21 мая 2013
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2013-0847: kernel security and bug fix update (MODERATE)

kernel [2.6.18-348.6.1]

  • [char] ipmi: use a tasklet for handling received messages (Tony Camuso) [953435 947732]
  • [char] ipmi: do run_to_completion properly in deliver_recv_msg (Tony Camuso) [953435 947732]
  • [fs] nfs4: fix locking around cl_state_owners list (Dave Wysochanski) [954296 948317]
  • [fs] nfs: Fix bugs on short read (Sachin Prabhu) [952098 924011]
  • [xen] AMD IOMMU: spot missing IO-APIC entries in IVRS table (Igor Mammedov) [910912 910913] {CVE-2013-0153}
  • [xen] AMD, IOMMU: Make per-device interrupt remap table default (Igor Mammedov) [910912 910913] {CVE-2013-0153}
  • [xen] AMD, IOMMU: Disable IOMMU if SATA Combined mode is on (Igor Mammedov) [910912 910913] {CVE-2013-0153}
  • [xen] AMD, IOMMU: On creating entry clean up in remapping tables (Igor Mammedov) [910912 910913] {CVE-2013-0153}
  • [xen] ACPI: acpi_table_parse() should return handler's err code (Igor Mammedov) [910912 910913] {CVE-2013-0153}
  • [xen] introduce xzalloc() & Co (Igor Mammedov) [910912 910913] {CVE-2013-0153}
  • [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]
  • [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]
  • [x86-64] non lazy 'sleazy' fpu implementation (Prarit Bhargava) [948187 731531]

[2.6.18-348.5.1]

  • [fs] nfs: handle getattr failure during nfsv4 open (David Jeffery) [947736 906909]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-348.6.1.el5

kernel-debug

2.6.18-348.6.1.el5

kernel-debug-devel

2.6.18-348.6.1.el5

kernel-devel

2.6.18-348.6.1.el5

kernel-doc

2.6.18-348.6.1.el5

kernel-headers

2.6.18-348.6.1.el5

kernel-xen

2.6.18-348.6.1.el5

kernel-xen-devel

2.6.18-348.6.1.el5

ocfs2-2.6.18-348.6.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.6.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.6.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.6.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.6.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.6.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-348.6.1.el5

kernel-debug

2.6.18-348.6.1.el5

kernel-debug-devel

2.6.18-348.6.1.el5

kernel-devel

2.6.18-348.6.1.el5

kernel-doc

2.6.18-348.6.1.el5

kernel-headers

2.6.18-348.6.1.el5

kernel-xen

2.6.18-348.6.1.el5

kernel-xen-devel

2.6.18-348.6.1.el5

ocfs2-2.6.18-348.6.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.6.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.6.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.6.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.6.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.6.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-348.6.1.el5

kernel-PAE

2.6.18-348.6.1.el5

kernel-PAE-devel

2.6.18-348.6.1.el5

kernel-debug

2.6.18-348.6.1.el5

kernel-debug-devel

2.6.18-348.6.1.el5

kernel-devel

2.6.18-348.6.1.el5

kernel-doc

2.6.18-348.6.1.el5

kernel-headers

2.6.18-348.6.1.el5

kernel-xen

2.6.18-348.6.1.el5

kernel-xen-devel

2.6.18-348.6.1.el5

ocfs2-2.6.18-348.6.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.6.1.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-348.6.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.6.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.6.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.6.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-348.6.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.6.1.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

redhat
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

nvd
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

debian
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, wh ...

github
больше 3 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.