Описание
ELSA-2013-2584: Unbreakable Enterprise Kernel security update (IMPORTANT)
[2.6.39-400.211.2]
- fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check (Kees Cook) [Orabug: 17842208] {CVE-2013-1928}
- Bluetooth: RFCOMM - Fix info leak via getsockname() (Mathias Krause) [Orabug: 17842129] {CVE-2012-6545}
- Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST) (Mathias Krause) [Orabug: 17842105] {CVE-2012-6545}
- llc: Fix missing msg_namelen update in llc_ui_recvmsg() (Mathias Krause) [Orabug: 17842095] {CVE-2013-3231}
- HID: pantherlord: validate output report details (Kees Cook) [Orabug: 17842084] {CVE-2013-2892}
- HID: zeroplus: validate output report details (Kees Cook) [Orabug: 17842081] {CVE-2013-2889}
- HID: provide a helper for validating hid reports (Kees Cook) [Orabug: 17842081] {CVE-2013-2889}
- KVM: Fix iommu map/unmap to handle memory slot moves (Jerry Snitselaar) [Orabug: 17842075] {CVE-2013-4592}
- ansi_cprng: Fix off by one error in non-block size request (Jerry Snitselaar) [Orabug: 17842072] {CVE-2013-4345}
- HID: validate HID report id size (Kees Cook) [Orabug: 17842063] {CVE-2013-2888}
- ipv6: remove max_addresses check from ipv6_create_tempaddr (Hannes Frederic Sowa) [Orabug: 17842056] {CVE-2013-0343}
- ipv6: udp packets following an UFO enqueued packet need also be handled by UFO (Hannes Frederic Sowa) [Orabug: 17842050] {CVE-2013-4387}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.211.2.el5uek
kernel-uek-debug
2.6.39-400.211.2.el5uek
kernel-uek-debug-devel
2.6.39-400.211.2.el5uek
kernel-uek-devel
2.6.39-400.211.2.el5uek
kernel-uek-doc
2.6.39-400.211.2.el5uek
kernel-uek-firmware
2.6.39-400.211.2.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.211.2.el5uek
kernel-uek-debug
2.6.39-400.211.2.el5uek
kernel-uek-debug-devel
2.6.39-400.211.2.el5uek
kernel-uek-devel
2.6.39-400.211.2.el5uek
kernel-uek-doc
2.6.39-400.211.2.el5uek
kernel-uek-firmware
2.6.39-400.211.2.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.211.2.el6uek
kernel-uek-debug
2.6.39-400.211.2.el6uek
kernel-uek-debug-devel
2.6.39-400.211.2.el6uek
kernel-uek-devel
2.6.39-400.211.2.el6uek
kernel-uek-doc
2.6.39-400.211.2.el6uek
kernel-uek-firmware
2.6.39-400.211.2.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.211.2.el6uek
kernel-uek-debug
2.6.39-400.211.2.el6uek
kernel-uek-debug-devel
2.6.39-400.211.2.el6uek
kernel-uek-devel
2.6.39-400.211.2.el6uek
kernel-uek-doc
2.6.39-400.211.2.el6uek
kernel-uek-firmware
2.6.39-400.211.2.el6uek
Ссылки на источники
Связанные уязвимости
ELSA-2013-1645: Oracle Linux 6 kernel update (IMPORTANT)
ELSA-2013-2585: Unbreakable Enterprise Kernel security update (IMPORTANT)
The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.
The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.
The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.