Описание
ELSA-2013-2589: unbreakable enterprise kernel security update (IMPORTANT)
kernel-uek [2.6.32-400.33.4uek]
- kernel/signal.c: stop info leak via the tkill and the tgkill syscalls (Emese Revfy) [Orabug: 17951083] {CVE-2013-2141}
- ip_output: do skb ufo init for peeked non ufo skb as well (Jiri Pirko) [Orabug: 17951078] {CVE-2013-4470}
- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) (Andy Honig) [Orabug: 17951073] {CVE-2013-6367}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-400.33.4.el5uek
kernel-uek-debug
2.6.32-400.33.4.el5uek
kernel-uek-debug-devel
2.6.32-400.33.4.el5uek
kernel-uek-devel
2.6.32-400.33.4.el5uek
kernel-uek-doc
2.6.32-400.33.4.el5uek
kernel-uek-firmware
2.6.32-400.33.4.el5uek
kernel-uek-headers
2.6.32-400.33.4.el5uek
mlnx_en-2.6.32-400.33.4.el5uek
1.5.7-2
mlnx_en-2.6.32-400.33.4.el5uekdebug
1.5.7-2
ofa-2.6.32-400.33.4.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.33.4.el5uekdebug
1.5.1-4.0.58
Oracle Linux i386
kernel-uek
2.6.32-400.33.4.el5uek
kernel-uek-debug
2.6.32-400.33.4.el5uek
kernel-uek-debug-devel
2.6.32-400.33.4.el5uek
kernel-uek-devel
2.6.32-400.33.4.el5uek
kernel-uek-doc
2.6.32-400.33.4.el5uek
kernel-uek-firmware
2.6.32-400.33.4.el5uek
kernel-uek-headers
2.6.32-400.33.4.el5uek
mlnx_en-2.6.32-400.33.4.el5uek
1.5.7-2
mlnx_en-2.6.32-400.33.4.el5uekdebug
1.5.7-2
ofa-2.6.32-400.33.4.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.33.4.el5uekdebug
1.5.1-4.0.58
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-400.33.4.el6uek
kernel-uek-debug
2.6.32-400.33.4.el6uek
kernel-uek-debug-devel
2.6.32-400.33.4.el6uek
kernel-uek-devel
2.6.32-400.33.4.el6uek
kernel-uek-doc
2.6.32-400.33.4.el6uek
kernel-uek-firmware
2.6.32-400.33.4.el6uek
kernel-uek-headers
2.6.32-400.33.4.el6uek
mlnx_en-2.6.32-400.33.4.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.33.4.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.33.4.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.33.4.el6uekdebug
1.5.1-4.0.58
Oracle Linux i686
kernel-uek
2.6.32-400.33.4.el6uek
kernel-uek-debug
2.6.32-400.33.4.el6uek
kernel-uek-debug-devel
2.6.32-400.33.4.el6uek
kernel-uek-devel
2.6.32-400.33.4.el6uek
kernel-uek-doc
2.6.32-400.33.4.el6uek
kernel-uek-firmware
2.6.32-400.33.4.el6uek
kernel-uek-headers
2.6.32-400.33.4.el6uek
mlnx_en-2.6.32-400.33.4.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.33.4.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.33.4.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.33.4.el6uekdebug
1.5.1-4.0.58
Связанные CVE
Связанные уязвимости
ELSA-2013-1801: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2013-2588: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2013-2587: unbreakable enterprise kernel security update (IMPORTANT)
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.