Описание
ELSA-2013-2537: unbreakable enterprise kernel security update (MODERATE)
kernel-uek [2.6.32-400.29.2uek]
- Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() (Mathias Krause) [Orabug: 17173824] {CVE-2013-3225}
- Bluetooth: fix possible info leak in bt_sock_recvmsg() (Mathias Krause) [Orabug: 17173824] {CVE-2013-3224}
- atm: update msg_namelen in vcc_recvmsg() (Mathias Krause) [Orabug: 17173824] {CVE-2013-3222}
- dcbnl: fix various netlink info leaks (Mathias Krause) [Orabug: 17173824] {CVE-2013-2634}
- udf: avoid info leak on export (Mathias Krause) [Orabug: 17173824] {CVE-2012-6548}
- b43: stop format string leaking into error msgs (Kees Cook) [Orabug: 17173824] {CVE-2013-2852}
- signal: always clear sa_restorer on execve (Kees Cook) [Orabug: 17173824] {CVE-2013-0914}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-400.29.2.el5uek
kernel-uek-debug
2.6.32-400.29.2.el5uek
kernel-uek-debug-devel
2.6.32-400.29.2.el5uek
kernel-uek-devel
2.6.32-400.29.2.el5uek
kernel-uek-doc
2.6.32-400.29.2.el5uek
kernel-uek-firmware
2.6.32-400.29.2.el5uek
kernel-uek-headers
2.6.32-400.29.2.el5uek
mlnx_en-2.6.32-400.29.2.el5uek
1.5.7-2
mlnx_en-2.6.32-400.29.2.el5uekdebug
1.5.7-2
ofa-2.6.32-400.29.2.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.29.2.el5uekdebug
1.5.1-4.0.58
Oracle Linux i386
kernel-uek
2.6.32-400.29.2.el5uek
kernel-uek-debug
2.6.32-400.29.2.el5uek
kernel-uek-debug-devel
2.6.32-400.29.2.el5uek
kernel-uek-devel
2.6.32-400.29.2.el5uek
kernel-uek-doc
2.6.32-400.29.2.el5uek
kernel-uek-firmware
2.6.32-400.29.2.el5uek
kernel-uek-headers
2.6.32-400.29.2.el5uek
mlnx_en-2.6.32-400.29.2.el5uek
1.5.7-2
mlnx_en-2.6.32-400.29.2.el5uekdebug
1.5.7-2
ofa-2.6.32-400.29.2.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.29.2.el5uekdebug
1.5.1-4.0.58
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-400.29.2.el6uek
kernel-uek-debug
2.6.32-400.29.2.el6uek
kernel-uek-debug-devel
2.6.32-400.29.2.el6uek
kernel-uek-devel
2.6.32-400.29.2.el6uek
kernel-uek-doc
2.6.32-400.29.2.el6uek
kernel-uek-firmware
2.6.32-400.29.2.el6uek
kernel-uek-headers
2.6.32-400.29.2.el6uek
mlnx_en-2.6.32-400.29.2.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.29.2.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.29.2.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.29.2.el6uekdebug
1.5.1-4.0.58
Oracle Linux i686
kernel-uek
2.6.32-400.29.2.el6uek
kernel-uek-debug
2.6.32-400.29.2.el6uek
kernel-uek-debug-devel
2.6.32-400.29.2.el6uek
kernel-uek-devel
2.6.32-400.29.2.el6uek
kernel-uek-doc
2.6.32-400.29.2.el6uek
kernel-uek-firmware
2.6.32-400.29.2.el6uek
kernel-uek-headers
2.6.32-400.29.2.el6uek
mlnx_en-2.6.32-400.29.2.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.29.2.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.29.2.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.29.2.el6uekdebug
1.5.1-4.0.58
Ссылки на источники
Связанные уязвимости
ELSA-2013-2538: unbreakable enterprise kernel security update (MODERATE)
ELSA-2013-1051: kernel security and bug fix update (MODERATE)
ELSA-2013-1034-1: kernel security and bug fix update (LOW)
The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.