[ELSA-2013-2583] Unbreakable Enterprise Kernel security update
[3.8.13-16.2.2.el6uek]
- HID: pantherlord: validate output report details (Kees Cook) [Orabug: 17841973] {CVE-2013-2892}
- HID: zeroplus: validate output report details (Kees Cook) [Orabug: 17841968] {CVE-2013-2889}
- HID: provide a helper for validating hid reports (Kees Cook) [Orabug: 17841968] {CVE-2013-2889}
- KVM: Fix iommu map/unmap to handle memory slot moves (Alex Williamson) [Orabug: 17841960] {CVE-2013-4592}
- ansi_cprng: Fix off by one error in non-block size request (Jerry Snitselaar) [Orabug: 17837997] {CVE-2013-4345}
- HID: validate HID report id size (Kees Cook) [Orabug: 17841940] {CVE-2013-2888}
- ipv6: remove max_addresses check from ipv6_create_tempaddr (Hannes Frederic Sowa) [Orabug: 17841911] {CVE-2013-0343}
- ipv6: udp packets following an UFO enqueued packet need also be handled by UFO (Hannes Frederic Sowa) [Orabug: 17841928] {CVE-2013-4387}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | < 3.8.13-16.2.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-6 | < 3.8.13-16.2.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | < 3.8.13-16.2.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | < 3.8.13-16.2.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | < 3.8.13-16.2.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | < 3.8.13-16.2.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | < 3.8.13-16.2.2.el6uek |
pkg:rpm/oraclelinux/dtrace-modules-3.8.13-16.2.2.el6uek?distro=oraclelinux-6 | < 0.4.1-3.el6 |
pkg:rpm/oraclelinux/dtrace-modules-3.8.13-16.2.2.el6uek-provider-headers?distro=oraclelinux-6 | < 0.4.1-3.el6 |
pkg:rpm/oraclelinux/dtrace-modules-3.8.13-16.2.2.el6uek-headers?distro=oraclelinux-6 | < 0.4.1-3.el6 |
- ID
- ELSA-2013-2583
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2013-2583.html
- Published
-
2013-11-28T00:00:00
(10 years ago) - Modified
-
2013-11-28T00:00:00
(10 years ago) - Rights
- Copyright 2013 Oracle, Inc.
- Other Advisories
-
- ALAS-2013-228
- ALAS-2013-233
- ELSA-2013-1449
- ELSA-2013-1645
- ELSA-2013-2584
- ELSA-2013-2585
- ELSA-2014-0433
- FEDORA-2013-15151
- FEDORA-2013-15198
- FEDORA-2013-16336
- FEDORA-2013-16379
- FEDORA-2013-17010
- FEDORA-2013-17012
- FEDORA-2013-17865
- FEDORA-2013-17942
- FEDORA-2013-17982
- FEDORA-2013-18364
- FEDORA-2013-18820
- FEDORA-2013-18822
- FEDORA-2013-18867
- FEDORA-2013-20547
- FEDORA-2013-20748
- FEDORA-2013-21807
- FEDORA-2013-21822
- FEDORA-2013-22669
- FEDORA-2013-22695
- FEDORA-2013-23653
- FEDORA-2014-0684
- FEDORA-2014-1072
- FEDORA-2014-11008
- FEDORA-2014-13020
- FEDORA-2014-14068
- FEDORA-2014-17244
- FEDORA-2014-2606
- FEDORA-2014-2887
- FEDORA-2014-3448
- FEDORA-2014-4360
- FEDORA-2014-4849
- FEDORA-2014-5609
- FEDORA-2014-6354
- FEDORA-2014-7320
- FEDORA-2014-7426
- FEDORA-2014-8487
- FEDORA-2014-9142
- FEDORA-2014-9449
- RHSA-2013:1645
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- USN-1976-1
- USN-1977-1
- USN-1995-1
- USN-1998-1
- USN-2015-1
- USN-2016-1
- USN-2019-1
- USN-2020-1
- USN-2021-1
- USN-2022-1
- USN-2023-1
- USN-2024-1
- USN-2038-1
- USN-2039-1
- USN-2041-1
- USN-2045-1
- USN-2049-1
- USN-2050-1
- USN-2064-1
- USN-2065-1
- USN-2066-1
- USN-2067-1
- USN-2068-1
- USN-2070-1
- USN-2071-1
- USN-2072-1
- USN-2074-1
- USN-2075-1
- USN-2076-1
- USN-2109-1
- USN-2110-1
- USN-2111-1
- USN-2112-1
- USN-2114-1
- USN-2115-1
- USN-2116-1
- USN-2158-1
- USN-2233-1
- USN-2234-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2013-2583 | http://linux.oracle.com/errata/ELSA-2013-2583.html | |
CVE | CVE-2013-0343 | http://linux.oracle.com/cve/CVE-2013-0343 | |
CVE | CVE-2013-4345 | http://linux.oracle.com/cve/CVE-2013-4345 | |
CVE | CVE-2013-2888 | http://linux.oracle.com/cve/CVE-2013-2888 | |
CVE | CVE-2013-2889 | http://linux.oracle.com/cve/CVE-2013-2889 | |
CVE | CVE-2013-2892 | http://linux.oracle.com/cve/CVE-2013-2892 | |
CVE | CVE-2013-4387 | http://linux.oracle.com/cve/CVE-2013-4387 | |
CVE | CVE-2013-4592 | http://linux.oracle.com/cve/CVE-2013-4592 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 3.8.13-16.2.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-6 | oraclelinux | kernel-uek-headers | < 3.8.13-16.2.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 3.8.13-16.2.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 3.8.13-16.2.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 3.8.13-16.2.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 3.8.13-16.2.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 3.8.13-16.2.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-3.8.13-16.2.2.el6uek?distro=oraclelinux-6 | oraclelinux | dtrace-modules-3.8.13-16.2.2.el6uek | < 0.4.1-3.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-3.8.13-16.2.2.el6uek-provider-headers?distro=oraclelinux-6 | oraclelinux | dtrace-modules-3.8.13-16.2.2.el6uek-provider-headers | < 0.4.1-3.el6 | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-3.8.13-16.2.2.el6uek-headers?distro=oraclelinux-6 | oraclelinux | dtrace-modules-3.8.13-16.2.2.el6uek-headers | < 0.4.1-3.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |