Описание
ELSA-2013-2503: Unbreakable Enterprise kernel security update (MODERATE)
[2.6.39-300.28.1]
- kmod: make __request_module() killable (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398}
- kmod: introduce call_modprobe() helper (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398}
- usermodehelper: implement UMH_KILLABLE (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398}
- usermodehelper: introduce umh_complete(sub_info) (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398}
- KVM: x86: invalid opcode oops on SET_SREGS with OSXSAVE bit set (CVE-2012-4461) (Jerry Snitselaar) [Orabug: 16286290] {CVE-2012-4461}
- exec: do not leave bprm->interp on stack (Kees Cook) [Orabug: 16286267] {CVE-2012-4530}
- exec: use -ELOOP for max recursion depth (Kees Cook) [Orabug: 16286267] {CVE-2012-4530}
[2.6.39-300.27.1]
- xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}() (Jan Beulich) [Orabug: 16243736] {CVE-2013-0231}
- Xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS guests. (Frediano Ziglio) [Orabug: 16274171] {CVE-2013-0190}
- netback: correct netbk_tx_err to handle wrap around. (Ian Campbell) [Orabug: 16243309]
- xen/netback: free already allocated memory on failure in xen_netbk_get_requests (Ian Campbell) [Orabug: 16243309]
- xen/netback: don't leak pages on failure in xen_netbk_tx_check_gop. (Ian Campbell) [Orabug: 16243309]
- xen/netback: shutdown the ring if it contains garbage. (Ian Campbell) [Orabug: 16243309]
- ixgbevf fix typo in Makefile (Maxim Uvarov) [Orabug: 16179639 16168292]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-300.28.1.el5uek
kernel-uek-debug
2.6.39-300.28.1.el5uek
kernel-uek-debug-devel
2.6.39-300.28.1.el5uek
kernel-uek-devel
2.6.39-300.28.1.el5uek
kernel-uek-doc
2.6.39-300.28.1.el5uek
kernel-uek-firmware
2.6.39-300.28.1.el5uek
Oracle Linux i386
kernel-uek
2.6.39-300.28.1.el5uek
kernel-uek-debug
2.6.39-300.28.1.el5uek
kernel-uek-debug-devel
2.6.39-300.28.1.el5uek
kernel-uek-devel
2.6.39-300.28.1.el5uek
kernel-uek-doc
2.6.39-300.28.1.el5uek
kernel-uek-firmware
2.6.39-300.28.1.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-300.28.1.el6uek
kernel-uek-debug
2.6.39-300.28.1.el6uek
kernel-uek-debug-devel
2.6.39-300.28.1.el6uek
kernel-uek-devel
2.6.39-300.28.1.el6uek
kernel-uek-doc
2.6.39-300.28.1.el6uek
kernel-uek-firmware
2.6.39-300.28.1.el6uek
Oracle Linux i686
kernel-uek
2.6.39-300.28.1.el6uek
kernel-uek-debug
2.6.39-300.28.1.el6uek
kernel-uek-debug-devel
2.6.39-300.28.1.el6uek
kernel-uek-devel
2.6.39-300.28.1.el6uek
kernel-uek-doc
2.6.39-300.28.1.el6uek
kernel-uek-firmware
2.6.39-300.28.1.el6uek
Ссылки на источники
Связанные уязвимости
ELSA-2013-0223: kernel security and bug fix update (MODERATE)
The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
The __request_module function in kernel/kmod.c in the Linux kernel bef ...