[El-errata] ELSA-2012-2007 Moderate: Oracle Linux 5 Unbreakable Enterprise kernel security and bug fix update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Apr 23 13:21:17 PDT 2012
Oracle Linux Security Advisory ELSA-2012-2007
The following updated rpms for Oracle Linux 5 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-debug-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-headers-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-devel-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-doc-2.6.32-300.21.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.32-300.21.1.el5uek.noarch.rpm
ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-300.21.1.el5uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.i686.rpm
mlnx_en-2.6.32-300.21.1.el5uekdebug-1.5.7-2.i686.rpm
x86_64:
kernel-uek-firmware-2.6.32-300.21.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.32-300.21.1.el5uek.noarch.rpm
kernel-uek-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.21.1.el5uek.x86_64.rpm
ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-300.21.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.x86_64.rpm
mlnx_en-2.6.32-300.21.1.el5uekdebug-1.5.7-2.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-300.21.1.el5uek.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.src.rpm
Users with Oracle Linux Premier Support can now use Ksplice to patch
against this Security Advisory.
We recommend that all users of Oracle Linux 5 install these updates.
Users of Ksplice Uptrack can install these updates by running :
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
Description of changes:
* CVE-2012-0879: Denial of service in CLONE_IO.
CLONE_IO reference counting error could be exploited by an
unprivileged local user to cause denial of service.
* CVE-2012-1097: NULL pointer dereference in the ptrace subsystem.
Under certain circumstances, ptrace-ing a process could lead to a NULL
pointer dereference and kernel panic.
* CVE-2012-1090: Denial of service in the CIFS filesystem reference
counting.
Under certain circumstances, the CIFS filesystem would open a file on
lookup. If the file was determined later to be a FIFO or any other
special file the file handle would be leaked, leading to reference
counting mismatch and a kernel OOPS on unmount.
An unprivileged local user could use this flaw to crash the system.
kernel-uek:
[2.6.32-300.21.1.el5uek]
- regset: Return -EFAULT, not -EIO, on host-side memory fault (H. Peter
Anvin)
CVE-2012-1097
- regset: Prevent null pointer reference on readonly regsets (H. Peter
Anvin)
CVE-2012-1097
- cifs: fix dentry refcount leak when opening a FIFO on lookup (Jeff Layton)
CVE-2012-1090
- block: Fix io_context leak after failure of clone with CLONE_IO (Louis
Rilling) CVE-2012-0879
More information about the El-errata
mailing list