Описание
ELSA-2013-1292: kernel security and bug fix update (MODERATE)
kernel [2.6.18-348.18.1]
- [net] be2net: enable polling prior enabling interrupts globally (Ivan Vecera) [1005239 987539]
- [kernel] signals: stop info leak via tkill and tgkill syscalls (Oleg Nesterov) [970874 970875] {CVE-2013-2141}
- [net] ipv6: do udp_push_pending_frames AF_INET sock pending data (Jiri Benc) [987647 987648] {CVE-2013-4162}
- [mm] use-after-free in madvise_remove() (Jacob Tanenbaum) [849735 849736] {CVE-2012-3511}
- [fs] autofs: remove autofs dentry mount check (Ian Kent) [1001488 928098]
[2.6.18-348.17.1]
- [net] be2net: Fix to avoid hardware workaround when not needed (Ivan Vecera) [999819 995961]
- [net] be2net: Mark checksum fail for IP fragmented packets (Ivan Vecera) [983864 956322]
- [net] be2net: Avoid double insertion of vlan tags (Ivan Vecera) [983864 956322]
- [net] be2net: disable TX in be_close() (Ivan Vecera) [983864 956322]
- [net] be2net: fix EQ from getting full while cleaning RX CQ (Ivan Vecera) [983864 956322]
- [net] be2net: avoid napi_disable() when not enabled (Ivan Vecera) [983864 956322]
- [net] be2net: Fix receive Multicast Packets w/ Promiscuous mode (Ivan Vecera) [983864 956322]
- [net] be2net: Fixed memory leak (Ivan Vecera) [983864 956322]
- [net] be2net: Fix PVID tag offload for packets w/ inline VLAN tag (Ivan Vecera) [983864 956322]
- [net] be2net: fix a Tx stall bug caused by a specific ipv6 packet (Ivan Vecera) [983864 956322]
- [net] be2net: Remove an incorrect pvid check in Tx (Ivan Vecera) [983864 956322]
- [net] be2net: Fix issues in error recovery with wrong queue state (Ivan Vecera) [983864 956322]
- [net] netpoll: revert 6bdb7fe3104 and fix be_poll() instead (Ivan Vecera) [983864 956322]
- [net] be2net: Fix to parse RSS hash Receive completions correctly (Ivan Vecera) [983864 956322]
- [net] be2net: Fix cleanup path when EQ creation fails (Ivan Vecera) [983864 956322]
- [net] be2net: Fix Endian (Ivan Vecera) [983864 956322]
- [net] be2net: Fix to trim skb for padded vlan packets (Ivan Vecera) [983864 956322]
- [net] be2net: Explicitly clear reserved field in Tx Descriptor (Ivan Vecera) [983864 956322]
- [net] be2net: remove unnecessary usage of unlikely() (Ivan Vecera) [983864 956322]
- [net] be2net: do not modify PCI MaxReadReq size (Ivan Vecera) [983864 956322]
- [net] be2net: cleanup be_vid_config() (Ivan Vecera) [983864 956322]
- [net] be2net: don't call vid_config() when there no vlan config (Ivan Vecera) [983864 956322]
- [net] be2net: Ignore status of some ioctls during driver load (Ivan Vecera) [983864 956322]
- [net] be2net: Fix wrong status getting returned for MCC commands (Ivan Vecera) [983864 956322]
- [net] be2net: Fix VLAN/multicast packet reception (Ivan Vecera) [983864 956322]
- [net] be2net: fix wrong frag_idx reported by RX CQ (Ivan Vecera) [983864 956322]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-348.18.1.el5
kernel-debug
2.6.18-348.18.1.el5
kernel-debug-devel
2.6.18-348.18.1.el5
kernel-devel
2.6.18-348.18.1.el5
kernel-doc
2.6.18-348.18.1.el5
kernel-headers
2.6.18-348.18.1.el5
kernel-xen
2.6.18-348.18.1.el5
kernel-xen-devel
2.6.18-348.18.1.el5
ocfs2-2.6.18-348.18.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.18.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.18.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.18.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.18.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.18.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-348.18.1.el5
kernel-debug
2.6.18-348.18.1.el5
kernel-debug-devel
2.6.18-348.18.1.el5
kernel-devel
2.6.18-348.18.1.el5
kernel-doc
2.6.18-348.18.1.el5
kernel-headers
2.6.18-348.18.1.el5
kernel-xen
2.6.18-348.18.1.el5
kernel-xen-devel
2.6.18-348.18.1.el5
ocfs2-2.6.18-348.18.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.18.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.18.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.18.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.18.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.18.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-348.18.1.el5
kernel-PAE
2.6.18-348.18.1.el5
kernel-PAE-devel
2.6.18-348.18.1.el5
kernel-debug
2.6.18-348.18.1.el5
kernel-debug-devel
2.6.18-348.18.1.el5
kernel-devel
2.6.18-348.18.1.el5
kernel-doc
2.6.18-348.18.1.el5
kernel-headers
2.6.18-348.18.1.el5
kernel-xen
2.6.18-348.18.1.el5
kernel-xen-devel
2.6.18-348.18.1.el5
ocfs2-2.6.18-348.18.1.el5
1.4.10-1.el5
ocfs2-2.6.18-348.18.1.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-348.18.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-348.18.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-348.18.1.el5
2.0.5-1.el5
oracleasm-2.6.18-348.18.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-348.18.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-348.18.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
ELSA-2013-1292-1: kernel security and bug fix update (MODERATE)
The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
The do_tkill function in kernel/signal.c in the Linux kernel before 3. ...