Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-2538

Опубликовано: 18 июл. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2013-2538: unbreakable enterprise kernel security update (MODERATE)

[2.6.39-400.109.3]

  • Revert 'be2net: enable interrupts in probe' (Jerry Snitselaar) [Orabug: 17179597]

[2.6.39-400.109.2]

  • be2net: enable interrupts in probe (Jerry Snitselaar) [Orabug: 17080364]
  • Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() (Mathias Krause) [Orabug: 17173830] {CVE-2013-3225}
  • Bluetooth: fix possible info leak in bt_sock_recvmsg() (Mathias Krause) [Orabug: 17173830] {CVE-2013-3224}
  • atm: update msg_namelen in vcc_recvmsg() (Mathias Krause) [Orabug: 17173830] {CVE-2013-3222}
  • rtnl: fix info leak on RTM_GETLINK request for VF devices (Mathias Krause) [Orabug: 17173830] {CVE-2013-2635}
  • dcbnl: fix various netlink info leaks (Mathias Krause) [Orabug: 17173830] {CVE-2013-2634}
  • udf: avoid info leak on export (Mathias Krause) [Orabug: 17173830] {CVE-2012-6548}
  • tracing: Fix possible NULL pointer dereferences (Namhyung Kim) [Orabug: 17173830] {CVE-2013-3301}
  • b43: stop format string leaking into error msgs (Kees Cook) [Orabug: 17173830] {CVE-2013-2852}
  • signal: always clear sa_restorer on execve (Kees Cook) [Orabug: 17173830] {CVE-2013-0914}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.39-400.109.3.el5uek

kernel-uek-debug

2.6.39-400.109.3.el5uek

kernel-uek-debug-devel

2.6.39-400.109.3.el5uek

kernel-uek-devel

2.6.39-400.109.3.el5uek

kernel-uek-doc

2.6.39-400.109.3.el5uek

kernel-uek-firmware

2.6.39-400.109.3.el5uek

Oracle Linux i386

kernel-uek

2.6.39-400.109.3.el5uek

kernel-uek-debug

2.6.39-400.109.3.el5uek

kernel-uek-debug-devel

2.6.39-400.109.3.el5uek

kernel-uek-devel

2.6.39-400.109.3.el5uek

kernel-uek-doc

2.6.39-400.109.3.el5uek

kernel-uek-firmware

2.6.39-400.109.3.el5uek

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.39-400.109.3.el6uek

kernel-uek-debug

2.6.39-400.109.3.el6uek

kernel-uek-debug-devel

2.6.39-400.109.3.el6uek

kernel-uek-devel

2.6.39-400.109.3.el6uek

kernel-uek-doc

2.6.39-400.109.3.el6uek

kernel-uek-firmware

2.6.39-400.109.3.el6uek

Oracle Linux i686

kernel-uek

2.6.39-400.109.3.el6uek

kernel-uek-debug

2.6.39-400.109.3.el6uek

kernel-uek-debug-devel

2.6.39-400.109.3.el6uek

kernel-uek-devel

2.6.39-400.109.3.el6uek

kernel-uek-doc

2.6.39-400.109.3.el6uek

kernel-uek-firmware

2.6.39-400.109.3.el6uek

Связанные уязвимости

oracle-oval
почти 12 лет назад

ELSA-2013-1051: kernel security and bug fix update (MODERATE)

oracle-oval
почти 12 лет назад

ELSA-2013-2537: unbreakable enterprise kernel security update (MODERATE)

ubuntu
около 12 лет назад

The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

redhat
больше 12 лет назад

The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

nvd
около 12 лет назад

The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.