<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    <tt>Oracle Linux Security Advisory ELSA-2010-2009<br>
      <br>
      The following updated rpms for Oracle Linux 5 have been uploaded
      to the Unbreakable Linux Network:<br>
      <br>
      x86_64:<br>
      kernel-2.6.32-100.21.1.el5.x86_64.rpm<br>
      kernel-debug-2.6.32-100.21.1.el5.x86_64.rpm<br>
      kernel-debug-devel-2.6.32-100.21.1.el5.x86_64.rpm<br>
      kernel-devel-2.6.32-100.21.1.el5.x86_64.rpm<br>
      kernel-doc-2.6.32-100.21.1.el5.noarch.rpm<br>
      kernel-firmware-2.6.32-100.21.1.el5.x86_64.rpm<br>
      kernel-headers-2.6.32-100.21.1.el5.x86_64.rpm<br>
      ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.x86_64.rpm<br>
      <br>
      <br>
      SRPMS:<br>
      <a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol5/SRPMS-updates/kernel-2.6.32-100.21.1.el5.src.rpm">http://oss.oracle.com/ol5/SRPMS-updates/kernel-2.6.32-100.21.1.el5.src.rpm</a><br>
      <a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.src.rpm">http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.src.rpm</a><br>
      <br>
      Description of changes:<br>
      <br>
      Following Security bug are fixed in this errata<br>
      <br>
      <a
        href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3904">CVE-2010-3904</a><br>
      When copying data to userspace, the RDS protocol failed to verify
      that the user-provided address was a valid<br>
      userspace address.  A local unprivileged user could issue
      specially crafted socket calls to write arbitrary<br>
      values into kernel memory and potentially escalate privileges to
      root. <br>
      <br>
      <a
        href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067">CVE-2010-3067</a><br>
      Integer overflow in the do_io_submit function in fs/aio.c in the
      Linux kernel before 2.6.36-rc4-next-20100915 <br>
      allows local users to cause a denial of service or possibly have
      unspecified other impact via crafted use of <br>
      the io_submit system call. <br>
      <a
        href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3477"><br>
        CVE-2010-3477</a><br>
      The tcf_act_police_dump function in net/sched/act_police.c in the
      actions implementation in the network queueing <br>
      functionality in the Linux kernel before 2.6.36-rc4 does not
      properly initialize certain structure members, which <br>
      allows local users to obtain potentially sensitive information
      from kernel memory via vectors involving a dump <br>
      operation. NOTE: this vulnerability exists because of an
      incomplete fix for CVE-2010-2942. <br>
      <br>
      kernel:<br>
      <br>
      [2.6.32-100.21.1.el5]<br>
      - [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}<br>
      - [fuse]
      linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch<br>
      - [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch<br>
      - [aio]
      linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch<br>
      <br>
      ofa:<br>
      <br>
      [1.5.1-4.0.23]<br>
      - Fix rds permissions checks during copies<br>
      <br>
      [1.5.1-4.0.21]<br>
      - Update to BXOFED 1.5.1-1.3.6-5</tt><br>
     <!-- This signature was generated by the MyDesktop Oracle Business Signature utility version 3.5.7 -->
  </body>
</html>