Описание
ELSA-2013-2585: Unbreakable Enterprise Kernel security update (IMPORTANT)
kernel-uek [2.6.32-400.33.3uek]
- af_key: fix info leaks in notify messages (Mathias Krause) [Orabug: 17837974] {CVE-2013-2234}
- drivers/cdrom/cdrom.c: use kzalloc() for failing hardware (Jonathan Salwan) [Orabug: 17837971] {CVE-2013-2164}
- fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check (Kees Cook) [Orabug: 17837966] {CVE-2013-1928}
- Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST) (Mathias Krause) [Orabug: 17837959] {CVE-2012-6545}
- Bluetooth: RFCOMM - Fix info leak via getsockname() (Mathias Krause) [Orabug: 17838023] {CVE-2012-6545}
- llc: Fix missing msg_namelen update in llc_ui_recvmsg() (Mathias Krause) [Orabug: 17837945] {CVE-2013-3231}
- HID: pantherlord: validate output report details (Kees Cook) [Orabug: 17837942] {CVE-2013-2892}
- HID: zeroplus: validate output report details (Kees Cook) [Orabug: 17837936] {CVE-2013-2889}
- HID: provide a helper for validating hid reports (Kees Cook) [Orabug: 17837936]
- NFSv4: Check for buffer length in __nfs4_get_acl_uncached (Sven Wegener) [Orabug: 17837931] {CVE-2013-4591}
- ansi_cprng: Fix off by one error in non-block size request (Neil Horman) [Orabug: 17837999] {CVE-2013-4345}
- HID: validate HID report id size (Kees Cook) [Orabug: 17837925] {CVE-2013-2888}
- ipv6: remove max_addresses check from ipv6_create_tempaddr (Hannes Frederic Sowa) [Orabug: 17837923] {CVE-2013-0343}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-400.33.3.el5uek
kernel-uek-debug
2.6.32-400.33.3.el5uek
kernel-uek-debug-devel
2.6.32-400.33.3.el5uek
kernel-uek-devel
2.6.32-400.33.3.el5uek
kernel-uek-doc
2.6.32-400.33.3.el5uek
kernel-uek-firmware
2.6.32-400.33.3.el5uek
kernel-uek-headers
2.6.32-400.33.3.el5uek
mlnx_en-2.6.32-400.33.3.el5uek
1.5.7-2
mlnx_en-2.6.32-400.33.3.el5uekdebug
1.5.7-2
ofa-2.6.32-400.33.3.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.33.3.el5uekdebug
1.5.1-4.0.58
Oracle Linux i386
kernel-uek
2.6.32-400.33.3.el5uek
kernel-uek-debug
2.6.32-400.33.3.el5uek
kernel-uek-debug-devel
2.6.32-400.33.3.el5uek
kernel-uek-devel
2.6.32-400.33.3.el5uek
kernel-uek-doc
2.6.32-400.33.3.el5uek
kernel-uek-firmware
2.6.32-400.33.3.el5uek
kernel-uek-headers
2.6.32-400.33.3.el5uek
mlnx_en-2.6.32-400.33.3.el5uek
1.5.7-2
mlnx_en-2.6.32-400.33.3.el5uekdebug
1.5.7-2
ofa-2.6.32-400.33.3.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.33.3.el5uekdebug
1.5.1-4.0.58
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-400.33.3.el6uek
kernel-uek-debug
2.6.32-400.33.3.el6uek
kernel-uek-debug-devel
2.6.32-400.33.3.el6uek
kernel-uek-devel
2.6.32-400.33.3.el6uek
kernel-uek-doc
2.6.32-400.33.3.el6uek
kernel-uek-firmware
2.6.32-400.33.3.el6uek
kernel-uek-headers
2.6.32-400.33.3.el6uek
mlnx_en-2.6.32-400.33.3.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.33.3.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.33.3.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.33.3.el6uekdebug
1.5.1-4.0.58
Oracle Linux i686
kernel-uek
2.6.32-400.33.3.el6uek
kernel-uek-debug
2.6.32-400.33.3.el6uek
kernel-uek-debug-devel
2.6.32-400.33.3.el6uek
kernel-uek-devel
2.6.32-400.33.3.el6uek
kernel-uek-doc
2.6.32-400.33.3.el6uek
kernel-uek-firmware
2.6.32-400.33.3.el6uek
kernel-uek-headers
2.6.32-400.33.3.el6uek
mlnx_en-2.6.32-400.33.3.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.33.3.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.33.3.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.33.3.el6uekdebug
1.5.1-4.0.58
Ссылки на источники
Связанные уязвимости
ELSA-2013-1645: Oracle Linux 6 kernel update (IMPORTANT)
ELSA-2013-2584: Unbreakable Enterprise Kernel security update (IMPORTANT)
The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.