[ELSA-2013-0744] kernel security and bug fix update
[2.6.32-358.6.1]
- [virt] kvm: accept unaligned MSR_KVM_SYSTEM_TIME writes (Petr Matousek) [917020 917021] {CVE-2013-1796}
- [char] tty: hold lock across tty buffer finding and buffer filling (Prarit Bhargava) [928686 901780]
- [net] tcp: fix for zero packets_in_flight was too broad (Thomas Graf) [927309 920794]
- [net] tcp: frto should not set snd_cwnd to 0 (Thomas Graf) [927309 920794]
- [net] tcp: fix an infinite loop in tcp_slow_start() (Thomas Graf) [927309 920794]
- [net] tcp: fix ABC in tcp_slow_start() (Thomas Graf) [927309 920794]
- [netdrv] ehea: avoid accessing a NULL vgrp (Steve Best) [921535 911359]
- [net] sunrpc: Get rid of the redundant xprt->shutdown bit field (J. Bruce Fields) [915579 893584]
- [virt] kvm: do not #GP on unaligned MSR_KVM_SYSTEM_TIME write (Gleb Natapov) [917020 917021] {CVE-2013-1796}
- [drm] i915: bounds check execbuffer relocation count (Nikola Pajkovsky) [920523 920525] {CVE-2013-0913}
- [x86] irq: add quirk for broken interrupt remapping on 55XX chipsets (Neil Horman) [911267 887006]
- [kvm] Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (Gleb Natapov) [917024 917025] {CVE-2013-1797}
- [kvm] Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (Gleb Natapov) [917020 917021] {CVE-2013-1796}
- [kvm] Fix bounds checking in ioapic indirect register reads (Gleb Natapov) [917030 917032] {CVE-2013-1798}
- [kvm] x86: release kvmclock page on reset (Gleb Natapov) [917024 917025] {CVE-2013-1797}
- [security] keys: Fix race with concurrent install_user_keyrings() (David Howells) [916681 913258] {CVE-2013-1792}
- [virt] hv_balloon: Make adjustments to the pressure report (Jason Wang) [909156 902232]
[2.6.32-358.5.1]
- [fs] xfs: use maximum schedule timeout when ail is empty (Brian Foster) [921958 883905]
- [net] xfrm_user: fix info leak in copy_to_user_tmpl() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_policy() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_state() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_auth() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] atm: fix info leak in getsockopt(SO_ATMPVC) (Thomas Graf) [922386 922387] {CVE-2012-6546}
- [net] atm: fix info leak via getsockname() (Thomas Graf) [922386 922387] {CVE-2012-6546}
- [fs] nls: improve UTF8 -> UTF16 string conversion routine (Nikola Pajkovsky) [916118 916119] {CVE-2013-1773}
- [fs] fat: Fix stat->f_namelen (Nikola Pajkovsky) [916118 916119] {CVE-2013-1773}
- [netdrv] tun: fix ioctl() based info leaks (Thomas Graf) [922350 922351] {CVE-2012-6547}
- [virt] x86: Add a check to catch Xen emulation of Hyper-V (Andrew Jones) [923204 918239]
- [fs] cifs: fix expand_dfs_referral (Sachin Prabhu) [923098 902492]
- [fs] cifs: factor smb_vol allocation out of cifs_setup_volume_info (Sachin Prabhu) [923098 902492]
- [fs] cifs: have cifs_cleanup_volume_info not take a double pointer (Sachin Prabhu) [923098 902492]
- [fs] nfs: Dont allow NFS silly-renamed files to be deleted, no signal (Dave Wysochanski) [920266 905095]
[2.6.32-358.4.1]
- [fs] NLM: Ensure that we resend all pending blocking locks after a reclaim (Steve Dickson) [921150 913704]
- [fs] xfs: remove log force from xfs_buf_cond_lock() (Brian Foster) [921961 896224]
- [fs] xfs: recheck buffer pinned status after push trylock failure (Brian Foster) [921961 896224]
- [fs] nfs: Ensure that we check lock exclusive/shared type against open modes (Dave Wysochanski) [920268 916324]
- [powerpc] pseries: Fix partition migration hang in stop_topology_update (Steve Best) [921963 910597]
- [infiniband] qib: correction for faulty sparse warning correction (Jay Fenlason) [922154 901701]
- [usb] io_ti: Fix NULL dereference in chase_port() (Nikola Pajkovsky) [916198 916200] {CVE-2013-1774}
- [net] bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Nikola Pajkovsky) [914690 914691] {CVE-2013-0349}
- [char] tty: set_termios/set_termiox should not return -EINTR (Oleg Nesterov) [921145 904907]
- [netdrv] ehea: fix VLAN support (Steve Best) [921535 911359]
- [net] xfrm_user: return error pointer instead of NULL (Thomas Graf) [919388 919389] {CVE-2013-1826}
- [net] dccp: check ccid before NULL poiter dereference (Weiping Pan) [919187 919188] {CVE-2013-1827}
- [mm] tmpfs: fix use-after-free of mempolicy object (Nikola Pajkovsky) [915714 915715] {CVE-2013-1767}
- [fs] fuse: set page_descs length in fuse_buffered_write() (Brian Foster) [916957 915135]
- [fs] vfs: fix pointer dereference validation in d_validate (Carlos Maiolino) [915583 876600]
- [fs] cifs: after upcalling for krb5 creds, invalidate key rather than revoking it (Niels de Vos) [912452 885899]
- [fs] cifs: tmp_key_invalidate() should not set key->expiry to 0 (Niels de Vos) [912452 885899]
- [block] disable discard request merge temporarily (Mike Snitzer) [911475 907844]
[2.6.32-358.3.1]
- [net] netfilter: improve out-of-sync situation in TCP tracking (Flavio Leitner) [917690 629857]
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | < 2.6.32-358.6.1.el6 |
- ID
- ELSA-2013-0744
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2013-0744.html
- Published
-
2013-04-23T00:00:00
(11 years ago) - Modified
-
2013-04-23T00:00:00
(11 years ago) - Rights
- Copyright 2013 Oracle, Inc.
- Other Advisories
-
- ALAS-2013-200
- DSA-2669-1
- ELSA-2013-0727
- ELSA-2013-0747
- ELSA-2013-2513
- ELSA-2013-2519
- ELSA-2013-2520
- ELSA-2020-5676
- FEDORA-2013-10695
- FEDORA-2013-12530
- FEDORA-2013-12990
- FEDORA-2013-13536
- FEDORA-2013-15151
- FEDORA-2013-16336
- FEDORA-2013-17010
- FEDORA-2013-17942
- FEDORA-2013-18364
- FEDORA-2013-18822
- FEDORA-2013-20748
- FEDORA-2013-21822
- FEDORA-2013-22695
- FEDORA-2013-3223
- FEDORA-2013-3630
- FEDORA-2013-3893
- FEDORA-2013-3909
- FEDORA-2013-4012
- FEDORA-2013-4240
- FEDORA-2013-4357
- FEDORA-2013-5368
- FEDORA-2013-6041
- FEDORA-2013-6537
- FEDORA-2013-6999
- FEDORA-2013-9123
- RHSA-2013:0744
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- USN-1554-1
- USN-1558-1
- USN-1563-1
- USN-1579-1
- USN-1580-1
- USN-1594-1
- USN-1599-1
- USN-1607-1
- USN-1609-1
- USN-1610-1
- USN-1644-1
- USN-1645-1
- USN-1646-1
- USN-1647-1
- USN-1648-1
- USN-1649-1
- USN-1651-1
- USN-1652-1
- USN-1653-1
- USN-1743-1
- USN-1744-1
- USN-1745-1
- USN-1756-1
- USN-1760-1
- USN-1767-1
- USN-1768-1
- USN-1769-1
- USN-1774-1
- USN-1775-1
- USN-1776-1
- USN-1778-1
- USN-1781-1
- USN-1787-1
- USN-1788-1
- USN-1792-1
- USN-1793-1
- USN-1794-1
- USN-1795-1
- USN-1796-1
- USN-1797-1
- USN-1798-1
- USN-1805-1
- USN-1808-1
- USN-1809-1
- USN-1811-1
- USN-1812-1
- USN-1813-1
- USN-1814-1
- USN-1824-1
- USN-1829-1
- USN-1876-1
- USN-1877-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2013-0744 | http://linux.oracle.com/errata/ELSA-2013-0744.html | |
CVE | CVE-2013-1796 | http://linux.oracle.com/cve/CVE-2013-1796 | |
CVE | CVE-2013-1797 | http://linux.oracle.com/cve/CVE-2013-1797 | |
CVE | CVE-2013-1798 | http://linux.oracle.com/cve/CVE-2013-1798 | |
CVE | CVE-2013-0913 | http://linux.oracle.com/cve/CVE-2013-0913 | |
CVE | CVE-2013-1773 | http://linux.oracle.com/cve/CVE-2013-1773 | |
CVE | CVE-2012-6537 | http://linux.oracle.com/cve/CVE-2012-6537 | |
CVE | CVE-2012-6546 | http://linux.oracle.com/cve/CVE-2012-6546 | |
CVE | CVE-2012-6547 | http://linux.oracle.com/cve/CVE-2012-6547 | |
CVE | CVE-2013-1826 | http://linux.oracle.com/cve/CVE-2013-1826 | |
CVE | CVE-2013-0349 | http://linux.oracle.com/cve/CVE-2013-0349 | |
CVE | CVE-2013-1767 | http://linux.oracle.com/cve/CVE-2013-1767 | |
CVE | CVE-2013-1774 | http://linux.oracle.com/cve/CVE-2013-1774 | |
CVE | CVE-2013-1792 | http://linux.oracle.com/cve/CVE-2013-1792 | |
CVE | CVE-2013-1827 | http://linux.oracle.com/cve/CVE-2013-1827 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-6 | oraclelinux | python-perf | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-6 | oraclelinux | perf | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-6 | oraclelinux | kernel | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-6 | oraclelinux | kernel-headers | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-firmware?distro=oraclelinux-6 | oraclelinux | kernel-firmware | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-6 | oraclelinux | kernel-doc | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-6 | oraclelinux | kernel-devel | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-6 | oraclelinux | kernel-debug | < 2.6.32-358.6.1.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-debug-devel | < 2.6.32-358.6.1.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |