Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-2523

Опубликовано: 09 мая 2013
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2013-2523: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

[2.6.39-400.23.1]

  • Parallel mtrr init between cpus (Zhenzhong Duan) [Orabug: 16777774]
  • Merge tag 'v2.6.39-400.21.1.16748891' of git://ca-git.us.oracle.com/linux-uek-2.6.39-ofed into uek-2.6.39-400 (Maxim Uvarov) [Orabug: 16748891]
  • xen-blkfront: use a different scatterlist for each request (Roger Pau Monne)
  • Fix EN driver to work with newer FWs based on latest mlx4_core (Yuval Shaia) [Orabug: 16748891]

[2.6.39-400.22.1]

  • block: default SCSI command filter does not accomodate commands overlap across device classes (Jamie Iles) [Orabug: 16387137] {CVE-2012-4542}
  • Merge tag 'v2.6.39-400.21.1#bug16684527' of git://ca-git.us.oracle.com/linux-joejin-public into uek-2.6.39-400_errata (Maxim Uvarov) [Orabug: 16684527]
  • KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797) (Andy Honig) [Orabug: 16711660] {CVE-2013-1797}
  • Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson Lizardo) [Orabug: 16711065] {CVE-2013-0349}
  • USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch) [Orabug: 16425358] {CVE-2013-1774}
  • keys: fix race with concurrent install_user_keyrings() (David Howells) [Orabug: 16493354] {CVE-2013-1792}
  • KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) (Andy Honig) [Orabug: 16710951] {CVE-2013-1798}
  • KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796) (Andy Honig) [Orabug: 16710806] {CVE-2013-1796}
  • tmpfs: fix use-after-free of mempolicy object (Greg Thelen) [Orabug: 16515833] {CVE-2013-1767}
  • procfs: do not confuse jiffies with cputime64_t (Andreas Schwab) [Orabug: 16673925]
  • procfs: do not overflow get_{idle,iowait}_time for nohz (Michal Hocko) [Orabug: 16673925]
  • xen/evtchn: Handle VIRQ_TIMER before any other hardirq in event loop. (Keir Fraser) [Orabug: 16093126]
  • Fix device removal NULL pointer dereference (Joe Jin) [Orabug: 16684527]
  • put stricter guards on queue dead checks (James Bottomley) [Orabug: 16684527]

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.39-400.23.1.el5uek

kernel-uek-debug

2.6.39-400.23.1.el5uek

kernel-uek-debug-devel

2.6.39-400.23.1.el5uek

kernel-uek-devel

2.6.39-400.23.1.el5uek

kernel-uek-doc

2.6.39-400.23.1.el5uek

kernel-uek-firmware

2.6.39-400.23.1.el5uek

Oracle Linux i386

kernel-uek

2.6.39-400.23.1.el5uek

kernel-uek-debug

2.6.39-400.23.1.el5uek

kernel-uek-debug-devel

2.6.39-400.23.1.el5uek

kernel-uek-devel

2.6.39-400.23.1.el5uek

kernel-uek-doc

2.6.39-400.23.1.el5uek

kernel-uek-firmware

2.6.39-400.23.1.el5uek

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.39-400.23.1.el6uek

kernel-uek-debug

2.6.39-400.23.1.el6uek

kernel-uek-debug-devel

2.6.39-400.23.1.el6uek

kernel-uek-devel

2.6.39-400.23.1.el6uek

kernel-uek-doc

2.6.39-400.23.1.el6uek

kernel-uek-firmware

2.6.39-400.23.1.el6uek

Oracle Linux i686

kernel-uek

2.6.39-400.23.1.el6uek

kernel-uek-debug

2.6.39-400.23.1.el6uek

kernel-uek-debug-devel

2.6.39-400.23.1.el6uek

kernel-uek-devel

2.6.39-400.23.1.el6uek

kernel-uek-doc

2.6.39-400.23.1.el6uek

kernel-uek-firmware

2.6.39-400.23.1.el6uek

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

redhat
больше 12 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

nvd
больше 12 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

debian
больше 12 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly c ...

github
около 3 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.