[El-errata] ELSA-2012-2007 Moderate: Oracle Linux 5 Unbreakable Enterprise kernel security and bug fix update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Mon Apr 23 13:21:17 PDT 2012


Oracle Linux Security Advisory ELSA-2012-2007

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-debug-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-headers-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-devel-2.6.32-300.21.1.el5uek.i686.rpm
kernel-uek-doc-2.6.32-300.21.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.32-300.21.1.el5uek.noarch.rpm
ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-300.21.1.el5uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.i686.rpm
mlnx_en-2.6.32-300.21.1.el5uekdebug-1.5.7-2.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-300.21.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.32-300.21.1.el5uek.noarch.rpm
kernel-uek-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.21.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.21.1.el5uek.x86_64.rpm
ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-300.21.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.x86_64.rpm
mlnx_en-2.6.32-300.21.1.el5uekdebug-1.5.7-2.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-300.21.1.el5uek.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.src.rpm

Users with Oracle Linux Premier Support can now use Ksplice to patch
against this Security Advisory.

We recommend that all users of  Oracle Linux 5 install these updates.

Users of Ksplice Uptrack can install these updates by running :

# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.



Description of changes:

* CVE-2012-0879: Denial of service in CLONE_IO.

CLONE_IO reference counting error could be exploited by an
unprivileged local user to cause denial of service.


* CVE-2012-1097: NULL pointer dereference in the ptrace subsystem.

Under certain circumstances, ptrace-ing a process could lead to a NULL
pointer dereference and kernel panic.


* CVE-2012-1090: Denial of service in the CIFS filesystem reference
counting.

Under certain circumstances, the CIFS filesystem would open a file on
lookup. If the file was determined later to be a FIFO or any other
special file the file handle would be leaked, leading to reference
counting mismatch and a kernel OOPS on unmount.

An unprivileged local user could use this flaw to crash the system.

kernel-uek:

[2.6.32-300.21.1.el5uek]
- regset: Return -EFAULT, not -EIO, on host-side memory fault (H. Peter 
Anvin)
   CVE-2012-1097
- regset: Prevent null pointer reference on readonly regsets (H. Peter 
Anvin)
   CVE-2012-1097
- cifs: fix dentry refcount leak when opening a FIFO on lookup (Jeff Layton)
   CVE-2012-1090
- block: Fix io_context leak after failure of clone with CLONE_IO (Louis
   Rilling)  CVE-2012-0879






More information about the El-errata mailing list