Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1166

Опубликовано: 21 авг. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2013-1166: kernel security and bug fix update (IMPORTANT)

kernel [2.6.18-348.16.1]

  • [x86_64] Fix kdump failure due to 'x86_64: Early segment setup' (Paolo Bonzini) [988251 987244]
  • [xen] skip tracing if it was disabled instead of dying (Igor Mammedov) [987976 967053]
  • [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]
  • [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]
  • [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]
  • [x86-64] non lazy 'sleazy' fpu implementation (Prarit Bhargava) [948187 731531]

[2.6.18-348.15.1]

  • [fs] nfs: flush cached dir information slightly more readily (Scott Mayhew) [976441 853145]
  • [fs] nfs: Fix resolution prob with cache_change_attribute (Scott Mayhew) [976441 853145]
  • [fs] nfs: define function to update nfsi->cache_change_attribute (Scott Mayhew) [976441 853145]
  • [net] af_key: fix info leaks in notify messages (Jiri Benc) [980999 981000] {CVE-2013-2234}
  • [net] af_key: initialize satype in key_notify_policy_flush() (Jiri Benc) [981222 981224] {CVE-2013-2237}
  • [net] ipv6: ip6_sk_dst_check() must not assume ipv6 dst (Jiri Pirko) [981556 981557] {CVE-2013-2232}
  • [net] fix invalid free in ip_cmsg_send() callers (Petr Matousek) [980141 980142] {CVE-2013-2224}
  • [x86_64] Early segment setup for VT (Paolo Bonzini) [979920 978305]
  • [block] cpqarray: info leak in ida_locked_ioctl() (Tomas Henzl) [971245 971246] {CVE-2013-2147}
  • [block] cdrom: use kzalloc() for failing hardware (Frantisek Hrbata) [973103 973104] {CVE-2013-2164}
  • [mm] Break out when there is nothing more to write for the fs. (Larry Woodman) [972583 965359]

[2.6.18-348.14.1]

  • [net] Fix panic for vlan over gre via tun (Thomas Graf) [983452 981337]
  • [x86] mm: introduce proper mem barriers smp_invalidate_interrupt (Rafael Aquini) [983628 865095]

[2.6.18-348.13.1]

  • [net] sctp: Disallow new connection on a closing socket (Daniel Borkmann) [976569 974936] {CVE-2013-2206}
  • [net] sctp: Use correct sideffect command in dup cookie handling (Daniel Borkmann) [976569 974936] {CVE-2013-2206}
  • [net] sctp: deal with multiple COOKIE_ECHO chunks (Daniel Borkmann) [976569 974936] {CVE-2013-2206}
  • [net] tcp: bind() use stronger condition for bind_conflict (Flavio Leitner) [980811 957604]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-348.16.1.el5

kernel-debug

2.6.18-348.16.1.el5

kernel-debug-devel

2.6.18-348.16.1.el5

kernel-devel

2.6.18-348.16.1.el5

kernel-doc

2.6.18-348.16.1.el5

kernel-headers

2.6.18-348.16.1.el5

kernel-xen

2.6.18-348.16.1.el5

kernel-xen-devel

2.6.18-348.16.1.el5

ocfs2-2.6.18-348.16.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.16.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.16.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.16.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.16.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.16.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-348.16.1.el5

kernel-debug

2.6.18-348.16.1.el5

kernel-debug-devel

2.6.18-348.16.1.el5

kernel-devel

2.6.18-348.16.1.el5

kernel-doc

2.6.18-348.16.1.el5

kernel-headers

2.6.18-348.16.1.el5

kernel-xen

2.6.18-348.16.1.el5

kernel-xen-devel

2.6.18-348.16.1.el5

ocfs2-2.6.18-348.16.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.16.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.16.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.16.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.16.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.16.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-348.16.1.el5

kernel-PAE

2.6.18-348.16.1.el5

kernel-PAE-devel

2.6.18-348.16.1.el5

kernel-debug

2.6.18-348.16.1.el5

kernel-debug-devel

2.6.18-348.16.1.el5

kernel-devel

2.6.18-348.16.1.el5

kernel-doc

2.6.18-348.16.1.el5

kernel-headers

2.6.18-348.16.1.el5

kernel-xen

2.6.18-348.16.1.el5

kernel-xen-devel

2.6.18-348.16.1.el5

ocfs2-2.6.18-348.16.1.el5

1.4.10-1.el5

ocfs2-2.6.18-348.16.1.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-348.16.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-348.16.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-348.16.1.el5

2.0.5-1.el5

oracleasm-2.6.18-348.16.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-348.16.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-348.16.1.el5xen

2.0.5-1.el5

Связанные уязвимости

oracle-oval
почти 12 лет назад

ELSA-2013-1166-1: kernel security and bug fix update (IMPORTANT)

oracle-oval
почти 12 лет назад

ELSA-2013-1173: kernel security and bug fix update (IMPORTANT)

oracle-oval
почти 12 лет назад

ELSA-2013-2542: unbreakable enterprise kernel security update (IMPORTANT)

oracle-oval
почти 12 лет назад

ELSA-2013-2543: unbreakable enterprise kernel security update (IMPORTANT)

ubuntu
почти 12 лет назад

The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.

Уязвимость ELSA-2013-1166