Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-2504

Опубликовано: 06 фев. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2013-2504: Unbreakable Enterprise kernel security update (MODERATE)

[2.6.32-300.39.4]

  • exec: do not leave bprm->interp on stack (Kees Cook) [Orabug: 16286741] {CVE-2012-4530}
  • exec: use -ELOOP for max recursion depth (Kees Cook) [Orabug: 16286741] {CVE-2012-4530}

[2.6.32-300.39.3]

  • Xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS guests. (Frediano Ziglio) [Orabug: 16274192] {CVE-2013-0190}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.32-300.39.4.el5uek

kernel-uek-debug

2.6.32-300.39.4.el5uek

kernel-uek-debug-devel

2.6.32-300.39.4.el5uek

kernel-uek-devel

2.6.32-300.39.4.el5uek

kernel-uek-doc

2.6.32-300.39.4.el5uek

kernel-uek-firmware

2.6.32-300.39.4.el5uek

kernel-uek-headers

2.6.32-300.39.4.el5uek

mlnx_en-2.6.32-300.39.4.el5uek

1.5.7-2

mlnx_en-2.6.32-300.39.4.el5uekdebug

1.5.7-2

ofa-2.6.32-300.39.4.el5uek

1.5.1-4.0.58

ofa-2.6.32-300.39.4.el5uekdebug

1.5.1-4.0.58

Oracle Linux i386

kernel-uek

2.6.32-300.39.4.el5uek

kernel-uek-debug

2.6.32-300.39.4.el5uek

kernel-uek-debug-devel

2.6.32-300.39.4.el5uek

kernel-uek-devel

2.6.32-300.39.4.el5uek

kernel-uek-doc

2.6.32-300.39.4.el5uek

kernel-uek-firmware

2.6.32-300.39.4.el5uek

kernel-uek-headers

2.6.32-300.39.4.el5uek

mlnx_en-2.6.32-300.39.4.el5uek

1.5.7-2

mlnx_en-2.6.32-300.39.4.el5uekdebug

1.5.7-2

ofa-2.6.32-300.39.4.el5uek

1.5.1-4.0.58

ofa-2.6.32-300.39.4.el5uekdebug

1.5.1-4.0.58

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-300.39.4.el6uek

kernel-uek-debug

2.6.32-300.39.4.el6uek

kernel-uek-debug-devel

2.6.32-300.39.4.el6uek

kernel-uek-devel

2.6.32-300.39.4.el6uek

kernel-uek-doc

2.6.32-300.39.4.el6uek

kernel-uek-firmware

2.6.32-300.39.4.el6uek

kernel-uek-headers

2.6.32-300.39.4.el6uek

mlnx_en-2.6.32-300.39.4.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.39.4.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.39.4.el6uek

1.5.1-4.0.58

ofa-2.6.32-300.39.4.el6uekdebug

1.5.1-4.0.58

Oracle Linux i686

kernel-uek

2.6.32-300.39.4.el6uek

kernel-uek-debug

2.6.32-300.39.4.el6uek

kernel-uek-debug-devel

2.6.32-300.39.4.el6uek

kernel-uek-devel

2.6.32-300.39.4.el6uek

kernel-uek-doc

2.6.32-300.39.4.el6uek

kernel-uek-firmware

2.6.32-300.39.4.el6uek

kernel-uek-headers

2.6.32-300.39.4.el6uek

mlnx_en-2.6.32-300.39.4.el6uek

1.5.7-0.1

mlnx_en-2.6.32-300.39.4.el6uekdebug

1.5.7-0.1

ofa-2.6.32-300.39.4.el6uek

1.5.1-4.0.58

ofa-2.6.32-300.39.4.el6uekdebug

1.5.1-4.0.58

Связанные CVE

Связанные уязвимости

oracle-oval
больше 12 лет назад

ELSA-2013-2503: Unbreakable Enterprise kernel security update (MODERATE)

ubuntu
больше 12 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

redhat
больше 12 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

nvd
больше 12 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

debian
больше 12 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 ...