Описание
ELSA-2013-2588: unbreakable enterprise kernel security update (IMPORTANT)
[2.6.39-400.211.3]
- ip6_output: do skb ufo init for peeked non ufo skb as well (Jiri Pirko) [Orabug: 17951806] {CVE-2013-4470}
- ip_output: do skb ufo init for peeked non ufo skb as well (Jiri Pirko) [Orabug: 17951818] {CVE-2013-4470}
- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) (Andy Honig) [Orabug: 17951705] {CVE-2013-6367}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.211.3.el5uek
kernel-uek-debug
2.6.39-400.211.3.el5uek
kernel-uek-debug-devel
2.6.39-400.211.3.el5uek
kernel-uek-devel
2.6.39-400.211.3.el5uek
kernel-uek-doc
2.6.39-400.211.3.el5uek
kernel-uek-firmware
2.6.39-400.211.3.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.211.3.el5uek
kernel-uek-debug
2.6.39-400.211.3.el5uek
kernel-uek-debug-devel
2.6.39-400.211.3.el5uek
kernel-uek-devel
2.6.39-400.211.3.el5uek
kernel-uek-doc
2.6.39-400.211.3.el5uek
kernel-uek-firmware
2.6.39-400.211.3.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.211.3.el6uek
kernel-uek-debug
2.6.39-400.211.3.el6uek
kernel-uek-debug-devel
2.6.39-400.211.3.el6uek
kernel-uek-devel
2.6.39-400.211.3.el6uek
kernel-uek-doc
2.6.39-400.211.3.el6uek
kernel-uek-firmware
2.6.39-400.211.3.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.211.3.el6uek
kernel-uek-debug
2.6.39-400.211.3.el6uek
kernel-uek-debug-devel
2.6.39-400.211.3.el6uek
kernel-uek-devel
2.6.39-400.211.3.el6uek
kernel-uek-doc
2.6.39-400.211.3.el6uek
kernel-uek-firmware
2.6.39-400.211.3.el6uek
Связанные CVE
Связанные уязвимости
ELSA-2013-2589: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2013-2587: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2013-1801: kernel security, bug fix, and enhancement update (IMPORTANT)
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.