<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body bgcolor="#ffffff" text="#000000">
<tt>Oracle Linux Security Advisory ELSA-2010-2009<br>
<br>
The following updated rpms for Oracle Linux 5 have been uploaded
to the Unbreakable Linux Network:<br>
<br>
x86_64:<br>
kernel-2.6.32-100.21.1.el5.x86_64.rpm<br>
kernel-debug-2.6.32-100.21.1.el5.x86_64.rpm<br>
kernel-debug-devel-2.6.32-100.21.1.el5.x86_64.rpm<br>
kernel-devel-2.6.32-100.21.1.el5.x86_64.rpm<br>
kernel-doc-2.6.32-100.21.1.el5.noarch.rpm<br>
kernel-firmware-2.6.32-100.21.1.el5.x86_64.rpm<br>
kernel-headers-2.6.32-100.21.1.el5.x86_64.rpm<br>
ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.x86_64.rpm<br>
<br>
<br>
SRPMS:<br>
<a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol5/SRPMS-updates/kernel-2.6.32-100.21.1.el5.src.rpm">http://oss.oracle.com/ol5/SRPMS-updates/kernel-2.6.32-100.21.1.el5.src.rpm</a><br>
<a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.src.rpm">http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.src.rpm</a><br>
<br>
Description of changes:<br>
<br>
Following Security bug are fixed in this errata<br>
<br>
<a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3904">CVE-2010-3904</a><br>
When copying data to userspace, the RDS protocol failed to verify
that the user-provided address was a valid<br>
userspace address. A local unprivileged user could issue
specially crafted socket calls to write arbitrary<br>
values into kernel memory and potentially escalate privileges to
root. <br>
<br>
<a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067">CVE-2010-3067</a><br>
Integer overflow in the do_io_submit function in fs/aio.c in the
Linux kernel before 2.6.36-rc4-next-20100915 <br>
allows local users to cause a denial of service or possibly have
unspecified other impact via crafted use of <br>
the io_submit system call. <br>
<a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3477"><br>
CVE-2010-3477</a><br>
The tcf_act_police_dump function in net/sched/act_police.c in the
actions implementation in the network queueing <br>
functionality in the Linux kernel before 2.6.36-rc4 does not
properly initialize certain structure members, which <br>
allows local users to obtain potentially sensitive information
from kernel memory via vectors involving a dump <br>
operation. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2010-2942. <br>
<br>
kernel:<br>
<br>
[2.6.32-100.21.1.el5]<br>
- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}<br>
- [fuse]
linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch<br>
- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch<br>
- [aio]
linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch<br>
<br>
ofa:<br>
<br>
[1.5.1-4.0.23]<br>
- Fix rds permissions checks during copies<br>
<br>
[1.5.1-4.0.21]<br>
- Update to BXOFED 1.5.1-1.3.6-5</tt><br>
<!-- This signature was generated by the MyDesktop Oracle Business Signature utility version 3.5.7 -->
</body>
</html>