[ELSA-2011-2014] Oracle Linux 6 Unbreakable Enterprise kernel security fix update
[2.6.32-100.28.11.el6]
- fs/partitions: Validate map_count in Mac partition tables {CVE-2011-1010}
- nfs4: Ensure that ACL pages sent over NFS were not allocated from
the slab (v3) {CVE-2011-1090}
[2.6.32-100.28.10.el6]
- Use cciss for some Smart Array controller for OL5 [orabug 11899706]
- CVEs from RHSA-2011-0421
- install_special_mapping skips security_file_mmap check {CVE-2010-4346}
- orinoco: fix TKIP countermeasure behaviour {CVE-2010-4648}
- net: clear heap allocation for ethtool_get_regs() {CVE-2010-4655}
- usb: iowarrior: don't trust report_size for buffer size {CVE-2010-4656}
- [media] [v3,media] av7110: check for negative array offset {CVE-2011-0521}
- RDMA/cma: Fix crash in request handlers {CVE-2011-0695}
- IB/cm: Bump reference count on cm_id before invoking callback {CVE-2011-0695}
- gro: reset skb_iif on reuse {CVE-2011-1478}
- ID
- ELSA-2011-2014
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2011-2014.html
- Published
-
2011-04-14T00:00:00
(13 years ago) - Modified
-
2011-04-14T00:00:00
(13 years ago) - Rights
- Copyright 2011 Oracle, Inc.
- Other Advisories
-
- ELSA-2011-0303
- ELSA-2011-0421
- ELSA-2011-0429
- ELSA-2011-0542
- ELSA-2011-0927
- FEDORA-2011-1138
- FEDORA-2011-2134
- FEDORA-2011-6447
- FEDORA-2011-6541
- RHSA-2011:0421
- RHSA-2011:0542
- RHSA-2011:0883
- SUSE-SU-2015:0652-1
- USN-1041-1
- USN-1080-1
- USN-1080-2
- USN-1081-1
- USN-1083-1
- USN-1093-1
- USN-1105-1
- USN-1111-1
- USN-1119-1
- USN-1133-1
- USN-1141-1
- USN-1146-1
- USN-1159-1
- USN-1160-1
- USN-1161-1
- USN-1162-1
- USN-1164-1
- USN-1168-1
- USN-1183-1
- USN-1186-1
- USN-1187-1
- USN-1202-1
- USN-1204-1
- USN-1256-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2011-2014 | http://linux.oracle.com/errata/ELSA-2011-2014.html | |
CVE | CVE-2010-4346 | http://linux.oracle.com/cve/CVE-2010-4346 | |
CVE | CVE-2010-4648 | http://linux.oracle.com/cve/CVE-2010-4648 | |
CVE | CVE-2010-4655 | http://linux.oracle.com/cve/CVE-2010-4655 | |
CVE | CVE-2010-4656 | http://linux.oracle.com/cve/CVE-2010-4656 | |
CVE | CVE-2011-0521 | http://linux.oracle.com/cve/CVE-2011-0521 | |
CVE | CVE-2011-0695 | http://linux.oracle.com/cve/CVE-2011-0695 | |
CVE | CVE-2011-1010 | http://linux.oracle.com/cve/CVE-2011-1010 | |
CVE | CVE-2011-1090 | http://linux.oracle.com/cve/CVE-2011-1090 | |
CVE | CVE-2011-1478 | http://linux.oracle.com/cve/CVE-2011-1478 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-100.28.11.el5debug | oraclelinux | ofa-2.6.32-100.28.11.el5debug | < 1.5.1-4.0.28 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-100.28.11.el5 | oraclelinux | ofa-2.6.32-100.28.11.el5 | < 1.5.1-4.0.28 | |||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.32-100.28.11.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.32-100.28.11.el5 | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-6 | oraclelinux | kernel-uek-headers | < 2.6.32-100.28.11.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-5 | oraclelinux | kernel-uek-headers | < 2.6.32-100.28.11.el5 | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.32-100.28.11.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.32-100.28.11.el5 | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.32-100.28.11.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.32-100.28.11.el5 | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.32-100.28.11.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.32-100.28.11.el5 | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.32-100.28.11.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.32-100.28.11.el5 | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-100.28.11.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-100.28.11.el5 | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |