[El-errata] ELSA-2011-2029 Important: Oracle Linux 6 Unbreakable Enterprise kernel security update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Oct 10 11:37:02 PDT 2011
Oracle Linux Security Advisory ELSA-2011-2029
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-firmware-2.6.32-200.20.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-200.20.1.el6uek.noarch.rpm
kernel-uek-2.6.32-200.20.1.el6uek.i686.rpm
kernel-uek-headers-2.6.32-200.20.1.el6uek.i686.rpm
kernel-uek-devel-2.6.32-200.20.1.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.32-200.20.1.el6uek.i686.rpm
kernel-uek-debug-2.6.32-200.20.1.el6uek.i686.rpm
ofa-2.6.32-200.20.1.el6uek-1.5.1-4.0.47.i686.rpm
ofa-2.6.32-200.20.1.el6uekdebug-1.5.1-4.0.47.i686.rpm
x86_64:
kernel-uek-firmware-2.6.32-200.20.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-200.20.1.el6uek.noarch.rpm
kernel-uek-2.6.32-200.20.1.el6uek.x86_64.rpm
kernel-uek-headers-2.6.32-200.20.1.el6uek.x86_64.rpm
kernel-uek-devel-2.6.32-200.20.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-200.20.1.el6uek.x86_64.rpm
kernel-uek-debug-2.6.32-200.20.1.el6uek.x86_64.rpm
ofa-2.6.32-200.20.1.el6uek-1.5.1-4.0.47.x86_64.rpm
ofa-2.6.32-200.20.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.32-200.20.1.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/ofa-2.6.32-200.20.1.el6uek-1.5.1-4.0.47.src.rpm
Users with Oracle Linux Premier Support can now use Ksplice to patch
against this
Security Advisory.
We recommend that all users of Oracle Linux 6 install these updates.
Users of Ksplice Uptrack can install these updates by running :
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
Description of changes:
* CVE-2011-2898: Information leak in packet subsystem
Uninitialized struct padding in the packet subsystem led to an
information leak of two bytes of kernel memory to userspace.
* CVE-2011-2723: Remote denial of service vulnerability in gro.
The skb_gro_header_slow function in the Linux kernel had a bug which
allowed a remote attacker to put certain gro fields in an inconsistent
state, resulting in a denial of service.
* CVE-2011-2496: Local denial of service in mremap().
Robert Swiecki discovered that mremap() could be abused for local denial of
service by triggering a BUG_ON assert.
* CVE-2011-2484: Denial of service in taskstats subsystem.
The add_del_listener function in kernel/taskstats.c in the Linux kernel
did not prevent multiple registrations of exit handlers, which allowed
local users to cause a denial of service (memory and CPU consumption),
and bypass the OOM Killer, via a crafted application.
* CVE-2011-1833: Information disclosure in eCryptfs.
Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs
incorrectly validated permissions on the requested source directory. A
local attacker could use this flaw to mount an arbitrary directory,
possibly leading to information disclosure.
[2.6.32-200.20.1.el6uek]
- af_packet: prevent information leak {CVE-2011-2898}
- gro: Only reset frag0 when skb can be pulled {CVE-2011-2723}
- vm: fix vm_pgoff wrap in upward expansion {CVE-2011-2496}
- taskstats: don't allow duplicate entries in listener mode {CVE-2011-2484}
- Ecryptfs: Add mount option to check uid of device being mounted
{CVE-2011-1833}
More information about the El-errata
mailing list