[ELSA-2011-1465] kernel security and bug fix update
[2.6.32-131.21.1.el6]
- [net] ipv6/udp: fix the wrong headroom check (Thomas Graf) [753167 698170]
[2.6.32-131.20.1.el6]
- [net] vlan: fix panic when handling priority tagged frames (Andy Gospodarek) [742849 714936] {CVE-2011-3593}
- [netdrv] igb: fix WOL on second port of i350 device (Frantisek Hrbata) [743807 718293]
- [kernel] fix taskstats io infoleak (Jerome Marchand) [716847 716848] {CVE-2011-2494}
- [tpm] Zero buffer after copying to userspace (Jiri Benc) [732632 732633] {CVE-2011-1162}
- [scsi] Revert megaraid_sas: Driver only report tape drive, JBOD and logic drives (Tomas Henzl) [741167 736667]
- [x86] acpi: Prevent acpiphp from deadlocking on PCI-to-PCI bridge remove (Prarit Bhargava) [745557 732706]
- [net] sctp: deal with multiple COOKIE_ECHO chunks (Frantisek Hrbata) [743510 729220]
- [scsi] iscsi_tcp: fix locking around iscsi sk user data (Mike Christie) [741704 647268]
- [kernel] first time swap use results in heavy swapping (Hendrik Brueckner) [747868 722461]
- [scsi] Reduce error recovery time by reducing use of TURs (Mike Christie) [744811 691945]
- [fs] cifs: add fallback in is_path_accessible for old servers (Jeff Layton) [738301 692709] {CVE-2011-3363}
- [fs] cifs: always do is_path_accessible check in cifs_mount (Jeff Layton) [738301 692709] {CVE-2011-3363}
- [net] ipv6: fix NULL dereference in udp6_ufo_fragment() (Jason Wang) [748808 740465]
- [net] ipv6: make fragment identifications less predictable (Jiri Pirko) [723432 723433] {CVE-2011-2699}
[2.6.32-131.19.1.el6]
- [scsi] scan: don't fail scans when host is in recovery (Mike Christie) [734774 713682]
- [netdrv] b43: allocate receive buffers big enough for max frame len + offset (RuiRui Yang) [738204 738205] {CVE-2011-3359}
- [fs] fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message (RuiRui Yang) [736764 736765] {CVE-2011-3353}
- [fs] cifs: fix possible memory corruption in CIFSFindNext (Jeff Layton) [737482 730354] {CVE-2011-3191}
- [kernel] perf tools: do not look at ./config for configuration (Jiri Benc) [730203 730204] {CVE-2011-2905}
- [x86] mm: Fix pgd_lock deadlock (Andrew Jones) [737570 691310]
- [mm] pdpte registers are not flushed when PGD entry is changed in x86 PAE mode (Andrew Jones) [737570 691310]
- [mm] Revert 'fix pgd_lock deadlock' (Andrew Jones) [737570 691310]
- [fs] corrupted GUID partition tables can cause kernel oops (Jerome Marchand) [695981 695982] {CVE-2011-1577}
- [net] Compute protocol sequence numbers and fragment IDs using MD5. (Jiri Pirko) [732664 732665] {CVE-2011-3188}
- [crypto] Move md5_transform to lib/md5.c (Jiri Pirko) [732664 732665] {CVE-2011-3188}
- [fs] SUNRPC: Fix use of static variable in rpcb_getport_async (Steve Dickson) [740230 723650]
- [fs] NFSv4.1: update nfs4_fattr_bitmap_maxsz (Steve Dickson) [740230 723650]
- [fs] SUNRPC: Fix a race between work-queue and rpc_killall_tasks (Steve Dickson) [740230 723650]
- [fs] SUNRPC: Ensure we always run the tk_callback before tk_action (Steve Dickson) [740230 723650]
- [misc] enclosure: fix error path to actually return ERR_PTR() on error (Tomas Henzl) [741166 713730]
- [virt] KVM: make guest mode entry to be rcu quiescent state (Gleb Natapov) [740352 712653]
- [virt] rcu: provide rcu_virt_note_context_switch() function (Gleb Natapov) [740352 712653]
[2.6.32-131.18.1.el6]
- [sched] wait_for_completion_interruptible_timeout() should return signed long (J. Bruce Fields) [745413 738379]
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | < 2.6.32-131.21.1.el6 |
- ID
- ELSA-2011-1465
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2011-1465.html
- Published
-
2011-11-22T00:00:00
(13 years ago) - Modified
-
2011-11-22T00:00:00
(13 years ago) - Rights
- Copyright 2011 Oracle, Inc.
- Other Advisories
-
- ALAS-2011-16
- ALAS-2011-26
- ELSA-2011-0833
- ELSA-2011-1386
- ELSA-2011-1479
- ELSA-2011-2033
- ELSA-2011-2037
- FEDORA-2011-11019
- FEDORA-2011-11103
- FEDORA-2011-12823
- FEDORA-2011-12874
- FEDORA-2011-13809
- FEDORA-2011-14747
- FEDORA-2011-15241
- FEDORA-2011-15856
- FEDORA-2011-16346
- FEDORA-2011-16621
- FEDORA-2011-7823
- FEDORA-2012-0492
- FEDORA-2012-0861
- FEDORA-2012-1503
- FEDORA-2012-2753
- FEDORA-2012-3356
- FEDORA-2012-3715
- FEDORA-2012-6406
- FEDORA-2012-7594
- FEDORA-2012-8931
- RHSA-2011:1465
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0652-1
- USN-1141-1
- USN-1159-1
- USN-1160-1
- USN-1161-1
- USN-1162-1
- USN-1167-1
- USN-1168-1
- USN-1170-1
- USN-1183-1
- USN-1187-1
- USN-1193-1
- USN-1202-1
- USN-1203-1
- USN-1204-1
- USN-1208-1
- USN-1211-1
- USN-1212-1
- USN-1216-1
- USN-1218-1
- USN-1219-1
- USN-1220-1
- USN-1225-1
- USN-1227-1
- USN-1228-1
- USN-1236-1
- USN-1239-1
- USN-1240-1
- USN-1241-1
- USN-1242-1
- USN-1243-1
- USN-1244-1
- USN-1245-1
- USN-1246-1
- USN-1253-1
- USN-1256-1
- USN-1260-1
- USN-1275-1
- USN-1279-1
- USN-1281-1
- USN-1285-1
- USN-1292-1
- USN-1293-1
- USN-1294-1
- USN-1299-1
- USN-1302-1
- USN-1303-1
- USN-1304-1
- USN-1311-1
- USN-1318-1
- USN-1319-1
- USN-1323-1
- USN-1325-1
- USN-1329-1
- USN-1332-1
- USN-1337-1
- USN-1341-1
- USN-1345-1
- USN-1361-1
- USN-1362-1
- USN-1386-1
- USN-1387-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2011-1465 | http://linux.oracle.com/errata/ELSA-2011-1465.html | |
CVE | CVE-2011-1162 | http://linux.oracle.com/cve/CVE-2011-1162 | |
CVE | CVE-2011-1577 | http://linux.oracle.com/cve/CVE-2011-1577 | |
CVE | CVE-2011-2494 | http://linux.oracle.com/cve/CVE-2011-2494 | |
CVE | CVE-2011-2699 | http://linux.oracle.com/cve/CVE-2011-2699 | |
CVE | CVE-2011-2905 | http://linux.oracle.com/cve/CVE-2011-2905 | |
CVE | CVE-2011-3188 | http://linux.oracle.com/cve/CVE-2011-3188 | |
CVE | CVE-2011-3191 | http://linux.oracle.com/cve/CVE-2011-3191 | |
CVE | CVE-2011-3353 | http://linux.oracle.com/cve/CVE-2011-3353 | |
CVE | CVE-2011-3359 | http://linux.oracle.com/cve/CVE-2011-3359 | |
CVE | CVE-2011-3363 | http://linux.oracle.com/cve/CVE-2011-3363 | |
CVE | CVE-2011-3593 | http://linux.oracle.com/cve/CVE-2011-3593 | |
CVE | CVE-2011-4326 | http://linux.oracle.com/cve/CVE-2011-4326 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | oraclelinux | perf | < 2.6.32-131.21.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | oraclelinux | kernel | < 2.6.32-131.21.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | oraclelinux | kernel-headers | < 2.6.32-131.21.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | oraclelinux | kernel-firmware | < 2.6.32-131.21.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | oraclelinux | kernel-doc | < 2.6.32-131.21.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | oraclelinux | kernel-devel | < 2.6.32-131.21.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | oraclelinux | kernel-debug | < 2.6.32-131.21.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-debug-devel | < 2.6.32-131.21.1.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |