<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body bgcolor="#ffffff" text="#000000">
<tt>Oracle Linux Security Advisory ELSA-2011-2016<br>
<br>
The following updated rpms for Oracle Linux 5 have been uploaded
to the Unbreakable Linux Network:<br>
<br>
<br>
x86_64:<br>
kernel-uek-firmware-2.6.32-100.28.17.el5.noarch.rpm<br>
kernel-uek-doc-2.6.32-100.28.17.el5.noarch.rpm<br>
kernel-uek-2.6.32-100.28.17.el5.x86_64.rpm<br>
kernel-uek-headers-2.6.32-100.28.17.el5.x86_64.rpm<br>
kernel-uek-devel-2.6.32-100.28.17.el5.x86_64.rpm<br>
kernel-uek-debug-devel-2.6.32-100.28.17.el5.x86_64.rpm<br>
kernel-uek-debug-2.6.32-100.28.17.el5.x86_64.rpm<br>
ofa-2.6.32-100.28.17.el5-1.5.1-4.0.28.x86_64.rpm<br>
ofa-2.6.32-100.28.17.el5debug-1.5.1-4.0.28.x86_64.rpm<br>
el<br>
<br>
<br>
SRPMS:<br>
<a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-100.28.17.el5.src.rpm">http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-100.28.17.el5.src.rpm</a><br>
<a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-100.28.17.el5-1.5.1-4.0.28.src.rpm">http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-100.28.17.el5-1.5.1-4.0.28.src.rpm</a><br>
<br>
<br>
Description of changes:<br>
<br>
[2.6.32-100.28.17.el5]<br>
- [net] Extend prot->slab size when add sock extend fields.<br>
<br>
[2.6.32-100.28.16.el5]<br>
- kernel: Fix unlimited socket backlog DoS {CVE-2010-4251}<br>
- RDS: Fix congestion issues for loopback<br>
- rds: prevent BUG_ON triggering on congestion map updates
{CVE-2011-1023}<br>
- epoll: prevent creating circular epoll structures
{CVE-2011-1082}<br>
- fs: fix corrupted OSF partition table parsing {CVE-2011-1163}<br>
- fs: Increase OSF partition limit from 8 to 18 {CVE-2011-1163}<br>
- netfilter: arp_tables: fix infoleak to userspace {CVE-2011-1170}<br>
- netfilter: ip_tables: fix infoleak to userspace {CVE-2011-1171}<br>
- ipv6: netfilter: ip6_tables: fix infoleak to userspace
{CVE-2011-1172}<br>
- [SCSI] mpt2sas: prevent heap overflows and unchecked reads
{CVE-2011-1494, CVE-2011-1495}</tt><br>
<br>
<!-- This signature was generated by the MyDesktop Oracle Business Signature utility version 3.5.7 -->
</body>
</html>