Описание
ELSA-2013-0847: kernel security and bug fix update (MODERATE)
kernel [2.6.18-348.6.1]
- [char] ipmi: use a tasklet for handling received messages (Tony Camuso) [953435 947732]
- [char] ipmi: do run_to_completion properly in deliver_recv_msg (Tony Camuso) [953435 947732]
- [fs] nfs4: fix locking around cl_state_owners list (Dave Wysochanski) [954296 948317]
- [fs] nfs: Fix bugs on short read (Sachin Prabhu) [952098 924011]
- [xen] AMD IOMMU: spot missing IO-APIC entries in IVRS table (Igor Mammedov) [910912 910913] {CVE-2013-0153}
- [xen] AMD, IOMMU: Make per-device interrupt remap table default (Igor Mammedov) [910912 910913] {CVE-2013-0153}
- [xen] AMD, IOMMU: Disable IOMMU if SATA Combined mode is on (Igor Mammedov) [910912 910913] {CVE-2013-0153}
- [xen] AMD, IOMMU: On creating entry clean up in remapping tables (Igor Mammedov) [910912 910913] {CVE-2013-0153}
- [xen] ACPI: acpi_table_parse() should return handler's err code (Igor Mammedov) [910912 910913] {CVE-2013-0153}
- [xen] introduce xzalloc() & Co (Igor Mammedov) [910912 910913] {CVE-2013-0153}
- [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]
- [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]
- [x86-64] non lazy 'sleazy' fpu implementation (Prarit Bhargava) [948187 731531]
[2.6.18-348.5.1]
- [fs] nfs: handle getattr failure during nfsv4 open (David Jeffery) [947736 906909]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-348.6.1.el5
kernel-debug
2.6.18-348.6.1.el5
kernel-debug-devel
2.6.18-348.6.1.el5
kernel-devel
2.6.18-348.6.1.el5
kernel-doc
2.6.18-348.6.1.el5
kernel-headers
2.6.18-348.6.1.el5
kernel-xen
2.6.18-348.6.1.el5
kernel-xen-devel
2.6.18-348.6.1.el5
ocfs2-2.6.18-348.6.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.6.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.6.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.6.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.6.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.6.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-348.6.1.el5
kernel-debug
2.6.18-348.6.1.el5
kernel-debug-devel
2.6.18-348.6.1.el5
kernel-devel
2.6.18-348.6.1.el5
kernel-doc
2.6.18-348.6.1.el5
kernel-headers
2.6.18-348.6.1.el5
kernel-xen
2.6.18-348.6.1.el5
kernel-xen-devel
2.6.18-348.6.1.el5
ocfs2-2.6.18-348.6.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.6.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.6.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.6.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.6.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.6.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-348.6.1.el5
kernel-PAE
2.6.18-348.6.1.el5
kernel-PAE-devel
2.6.18-348.6.1.el5
kernel-debug
2.6.18-348.6.1.el5
kernel-debug-devel
2.6.18-348.6.1.el5
kernel-devel
2.6.18-348.6.1.el5
kernel-doc
2.6.18-348.6.1.el5
kernel-headers
2.6.18-348.6.1.el5
kernel-xen
2.6.18-348.6.1.el5
kernel-xen-devel
2.6.18-348.6.1.el5
ocfs2-2.6.18-348.6.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.6.1.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-348.6.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.6.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.6.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.6.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-348.6.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.6.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, wh ...
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.