[ELSA-2012-2020] Unbreakable Enterprise kernel security and bugfix update
kernel-uek:
[2.6.32-300.27.1.el6uek]
- net: sock: validate data_len before allocating skb (Jason Wang) [Bugdb: 13966]{CVE-2012-2136}
- fcaps: clear the same personality flags as suid when fcaps are used (Eric Paris) [Bugdb: 13966] {CVE-2012-2123}
- Revert 'nfs: when attempting to open a directory, fall back on normal lookup (Todd Vierling) [Orabug 14141154]
[2.6.32-300.26.1.el6uek]
- mptsas: do not call __mptsas_probe in kthread (Maxim Uvarov) [Orabug:
14175509]
- mm: check if any page in a pageblock is reserved before marking it
MIGRATE_RESERVE (Maxim Uvarov) [Orabug: 14073214]
- mm: reduce the amount of work done when updating min_free_kbytes (Mel Gorman)
[Orabug: 14073214]
- vmxnet3: Updated to el6-u2 (Guangyu Sun) [Orabug: 14027961]
- xen: expose host uuid via sysfs. (Zhigang Wang)
- sched: Fix cgroup movement of waking process (Daisuke Nishimura) [Orabug:
13946210]
- sched: Fix cgroup movement of newly created process (Daisuke Nishimura)
[Orabug: 13946210]
- sched: Fix cgroup movement of forking process (Daisuke Nishimura) [Orabug:
13946210]
- x86, boot: Wait for boot cpu to show up if nr_cpus limit is about to hit
(Zhenzhong Duan) [Orabug: 13629087]
- smp: Use nr_cpus= to set nr_cpu_ids early (Zhenzhong Duan) [Orabug: 13629087]
- net: ipv4: relax AF_INET check in bind() (Maxim Uvarov) [Orabug: 14054411]
ofa-2.6.32-300.27.1.el6uek:
[1.5.1-4.0.58]
- Add Patch 158-169
- ID
- ELSA-2012-2020
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2012-2020.html
- Published
-
2012-06-19T00:00:00
(12 years ago) - Modified
-
2012-06-19T00:00:00
(12 years ago) - Rights
- Copyright 2012 Oracle, Inc.
- Other Advisories
-
- ALAS-2012-83
- ELSA-2012-0690
- ELSA-2012-0743
- FEDORA-2012-11348
- FEDORA-2012-12684
- FEDORA-2012-17479
- FEDORA-2012-18691
- FEDORA-2012-20240
- FEDORA-2012-6344
- FEDORA-2012-6386
- FEDORA-2012-6406
- FEDORA-2012-7538
- FEDORA-2012-7594
- FEDORA-2012-8359
- FEDORA-2012-8890
- FEDORA-2012-8931
- RHSA-2012:0743
- SUSE-SU-2015:0481-1
- USN-1445-1
- USN-1448-1
- USN-1452-1
- USN-1453-1
- USN-1455-1
- USN-1457-1
- USN-1459-1
- USN-1460-1
- USN-1470-1
- USN-1514-1
- USN-1529-1
- USN-1530-1
- USN-1531-1
- USN-1532-1
- USN-1533-1
- USN-1534-1
- USN-1535-1
- USN-1538-1
- USN-1539-1
- USN-1598-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2012-2020 | http://linux.oracle.com/errata/ELSA-2012-2020.html | |
CVE | CVE-2012-2136 | http://linux.oracle.com/cve/CVE-2012-2136 | |
CVE | CVE-2012-2123 | http://linux.oracle.com/cve/CVE-2012-2123 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.27.1.el6uekdebug | oraclelinux | ofa-2.6.32-300.27.1.el6uekdebug | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.27.1.el6uek | oraclelinux | ofa-2.6.32-300.27.1.el6uek | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.27.1.el5uekdebug | oraclelinux | ofa-2.6.32-300.27.1.el5uekdebug | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-300.27.1.el5uek | oraclelinux | ofa-2.6.32-300.27.1.el5uek | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.27.1.el6uekdebug | oraclelinux | mlnx_en-2.6.32-300.27.1.el6uekdebug | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.27.1.el6uek | oraclelinux | mlnx_en-2.6.32-300.27.1.el6uek | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.27.1.el5uekdebug | oraclelinux | mlnx_en-2.6.32-300.27.1.el5uekdebug | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-300.27.1.el5uek | oraclelinux | mlnx_en-2.6.32-300.27.1.el5uek | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.32-300.27.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.32-300.27.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-6 | oraclelinux | kernel-uek-headers | < 2.6.32-300.27.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-5 | oraclelinux | kernel-uek-headers | < 2.6.32-300.27.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.32-300.27.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.32-300.27.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.32-300.27.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.32-300.27.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.32-300.27.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.32-300.27.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.32-300.27.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.32-300.27.1.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-300.27.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-300.27.1.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |