[ELSA-2012-2003] Unbreakable Enterprise kernel security and bug fix update
[2.6.32-300.11.1.el6uek]
- [fs] xfs: Fix possible memory corruption in xfs_readlink (Carlos Maiolino) {CVE-2011-4077}
- [scsi] increase qla2xxx firmware ready time-out (Joe Jin)
- [scsi] qla2xxx: Module parameter to control use of async or sync port login (Joe Jin)
- [net] tg3: Fix single-vector MSI-X code (Joe Jin)
- [net] qlge: fix size of external list for TX address descriptors (Joe Jin)
- [net] e1000e: Avoid wrong check on TX hang (Joe Jin)
- crypto: ghash - Avoid null pointer dereference if no key is set (Nick Bowler) {CVE-2011-4081}
- jbd/jbd2: validate sb->s_first in journal_get_superblock() (Eryu Guan) {CVE-2011-4132}
- KVM: Device assignment permission checks (Joe Jin) {CVE-2011-4347}
- KVM: x86: Prevent starting PIT timers in the absence of irqchip support (Jan Kiszka) {CVE-2011-4622}
- xfs: validate acl count (Joe Jin) {CVE-2012-0038}
- KVM: x86: fix missing checks in syscall emulation (Joe Jin) {CVE-2012-0045}
- KVM: x86: extend 'struct x86_emulate_ops' with 'get_cpuid' (Joe Jin) {CVE-2012-0045}
- igmp: Avoid zero delay when receiving odd mixture of IGMP queries (Ben Hutchings) {CVE-2012-0207}
- ipv4: correct IGMP behavior on v3 query during v2-compatibility mode (David Stevens)
- fuse: fix fuse request unique id (Srinivas Eeda) [orabug 13816349]
[2.6.32-300.10.1.el6uek]
- net: remove extra register in ip_gre (Guru Anbalagane) [Orabug: 13633287]
[2.6.32-300.9.1.el6uek]
- [netdrv] fnic: return zero on fnic_reset() success (Joe Jin)
- [e1000e] Add entropy generation back for network interrupts (John Sobecki)
- [nfs4] LINUX CLIENT TREATS NFS4ERR_GRACE AS A PERMANENT ERROR orabug 13476821
- [nfs] NFS CLIENT CONNECTS TO SERVER THEN DISCONNECTS orabug 13516759
- [sunrpc] Add patch for a mount crash in __rpc_create_common orabug 13322773
[2.6.32-300.8.1.el6uek]
- SPEC: fix dependency on firmware/mkinitrd (Guru Anbalagane) [orabug 13637902]
- xfs: fix acl count validation in xfs_acl_from_disk() (Dan Carpenter)
- [SCSI] scsi_dh: check queuedata pointer before proceeding further (Moger Babu)
[orabug 13615419]
- ID
- ELSA-2012-2003
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2012-2003.html
- Published
-
2012-03-07T00:00:00
(12 years ago) - Modified
-
2012-03-07T00:00:00
(12 years ago) - Rights
- Copyright 2012 Oracle, Inc.
- Other Advisories
-
- ALAS-2011-22
- ALAS-2011-26
- ALAS-2012-55
- ELSA-2012-0007
- ELSA-2012-0051
- ELSA-2012-0107
- ELSA-2012-0149
- ELSA-2012-0350
- FEDORA-2011-15241
- FEDORA-2011-15856
- FEDORA-2011-15959
- FEDORA-2011-16237
- FEDORA-2011-16346
- FEDORA-2011-16621
- FEDORA-2011-17381
- FEDORA-2012-0145
- FEDORA-2012-0363
- FEDORA-2012-0480
- FEDORA-2012-0492
- FEDORA-2012-0861
- FEDORA-2012-0876
- FEDORA-2012-11348
- FEDORA-2012-12684
- FEDORA-2012-1497
- FEDORA-2012-1503
- FEDORA-2012-17479
- FEDORA-2012-18691
- FEDORA-2012-20240
- FEDORA-2012-2753
- FEDORA-2012-3030
- FEDORA-2012-3350
- FEDORA-2012-3356
- FEDORA-2012-3712
- FEDORA-2012-3715
- FEDORA-2012-4410
- FEDORA-2012-6386
- FEDORA-2012-6406
- FEDORA-2012-7538
- FEDORA-2012-7594
- FEDORA-2012-8359
- FEDORA-2012-8890
- FEDORA-2012-8931
- RHSA-2012:0350
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0652-1
- USN-1287-1
- USN-1291-1
- USN-1292-1
- USN-1293-1
- USN-1299-1
- USN-1300-1
- USN-1301-1
- USN-1302-1
- USN-1303-1
- USN-1304-1
- USN-1311-1
- USN-1312-1
- USN-1313-1
- USN-1322-1
- USN-1330-1
- USN-1336-1
- USN-1340-1
- USN-1356-1
- USN-1361-1
- USN-1362-1
- USN-1363-1
- USN-1364-1
- USN-1380-1
- USN-1384-1
- USN-1386-1
- USN-1387-1
- USN-1388-1
- USN-1389-1
- USN-1391-1
- USN-1394-1
- USN-1421-1
- USN-1422-1
- USN-1425-1
- USN-1426-1
- USN-1431-1
- USN-1433-1
- USN-1440-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2012-2003 | http://linux.oracle.com/errata/ELSA-2012-2003.html | |
CVE | CVE-2011-4081 | http://linux.oracle.com/cve/CVE-2011-4081 | |
CVE | CVE-2011-4347 | http://linux.oracle.com/cve/CVE-2011-4347 | |
CVE | CVE-2012-0038 | http://linux.oracle.com/cve/CVE-2012-0038 | |
CVE | CVE-2012-0045 | http://linux.oracle.com/cve/CVE-2012-0045 | |
CVE | CVE-2012-0207 | http://linux.oracle.com/cve/CVE-2012-0207 | |
CVE | CVE-2011-4077 | http://linux.oracle.com/cve/CVE-2011-4077 | |
CVE | CVE-2011-4132 | http://linux.oracle.com/cve/CVE-2011-4132 | |
CVE | CVE-2011-4622 | http://linux.oracle.com/cve/CVE-2011-4622 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.11.1.el6uekdebug | oraclelinux | ofa-2.6.32-300.11.1.el6uekdebug | < 1.5.1-4.0.47 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.11.1.el6uek | oraclelinux | ofa-2.6.32-300.11.1.el6uek | < 1.5.1-4.0.47 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.11.1.el5uekdebug | oraclelinux | ofa-2.6.32-300.11.1.el5uekdebug | < 1.5.1-4.0.53 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.11.1.el5uek | oraclelinux | ofa-2.6.32-300.11.1.el5uek | < 1.5.1-4.0.53 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.11.1.el6uekdebug | oraclelinux | mlnx_en-2.6.32-300.11.1.el6uekdebug | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.11.1.el6uek | oraclelinux | mlnx_en-2.6.32-300.11.1.el6uek | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.11.1.el5uekdebug | oraclelinux | mlnx_en-2.6.32-300.11.1.el5uekdebug | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.11.1.el5uek | oraclelinux | mlnx_en-2.6.32-300.11.1.el5uek | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.32-300.11.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.32-300.11.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-6 | oraclelinux | kernel-uek-headers | < 2.6.32-300.11.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-5 | oraclelinux | kernel-uek-headers | < 2.6.32-300.11.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.32-300.11.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.32-300.11.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.32-300.11.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.32-300.11.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.32-300.11.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.32-300.11.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.32-300.11.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.32-300.11.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-300.11.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-300.11.1.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |