Описание
ELSA-2013-1449: kernel security and bug fix update (MODERATE)
kernel [2.6.18-371.1.2]
- [xen] x86: check segment descriptor read result in 64-bit OUTS emulation (Radim Krcmar) [1012958 1012959] {CVE-2013-4368}
- [md] dm snapshot: fix data corruption (Mikulas Patocka) [1004734 975353] {CVE-2013-4299}
[2.6.18-371.1.1]
- [crypto] ansi_cprng fix off by one err in non-block size request (Neil Horman) [1007692 1007693] {CVE-2013-4345}
- [fs] gfs2: yield() in shrinker to allow glock_workqueues to run (Abhijith Das) [1014714 928518]
- [net] ipv6: ipv6_create_tempaddr cleanup (Petr Holasek) [999361 999362] {CVE-2013-0343}
- [net] ipv6: remove max_addresses check from ipv6_create_tempaddr (Petr Holasek) [999361 999362] {CVE-2013-0343}
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-371.1.2.el5
kernel-debug
2.6.18-371.1.2.el5
kernel-debug-devel
2.6.18-371.1.2.el5
kernel-devel
2.6.18-371.1.2.el5
kernel-doc
2.6.18-371.1.2.el5
kernel-headers
2.6.18-371.1.2.el5
kernel-xen
2.6.18-371.1.2.el5
kernel-xen-devel
2.6.18-371.1.2.el5
ocfs2-2.6.18-371.1.2.el5
1.4.10-1.el5
ocfs2-2.6.18-371.1.2.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.1.2.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.1.2.el5
2.0.5-1.el5
oracleasm-2.6.18-371.1.2.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.1.2.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-371.1.2.el5
kernel-debug
2.6.18-371.1.2.el5
kernel-debug-devel
2.6.18-371.1.2.el5
kernel-devel
2.6.18-371.1.2.el5
kernel-doc
2.6.18-371.1.2.el5
kernel-headers
2.6.18-371.1.2.el5
kernel-xen
2.6.18-371.1.2.el5
kernel-xen-devel
2.6.18-371.1.2.el5
ocfs2-2.6.18-371.1.2.el5
1.4.10-1.el5
ocfs2-2.6.18-371.1.2.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.1.2.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.1.2.el5
2.0.5-1.el5
oracleasm-2.6.18-371.1.2.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.1.2.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-371.1.2.el5
kernel-PAE
2.6.18-371.1.2.el5
kernel-PAE-devel
2.6.18-371.1.2.el5
kernel-debug
2.6.18-371.1.2.el5
kernel-debug-devel
2.6.18-371.1.2.el5
kernel-devel
2.6.18-371.1.2.el5
kernel-doc
2.6.18-371.1.2.el5
kernel-headers
2.6.18-371.1.2.el5
kernel-xen
2.6.18-371.1.2.el5
kernel-xen-devel
2.6.18-371.1.2.el5
ocfs2-2.6.18-371.1.2.el5
1.4.10-1.el5
ocfs2-2.6.18-371.1.2.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-371.1.2.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.1.2.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.1.2.el5
2.0.5-1.el5
oracleasm-2.6.18-371.1.2.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-371.1.2.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.1.2.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
ELSA-2013-1449-1: kernel security and bug fix update (MODERATE)
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c ...