[El-errata] ELSA-2012-2001 Important: Oracle Linux 6 Unbreakable Enterprise kernel security and bug fix update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Wed Jan 25 16:06:22 PST 2012
Oracle Linux Security Advisory ELSA-2012-2001
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-firmware-2.6.32-300.7.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-300.7.1.el6uek.noarch.rpm
kernel-uek-2.6.32-300.7.1.el6uek.i686.rpm
kernel-uek-headers-2.6.32-300.7.1.el6uek.i686.rpm
kernel-uek-devel-2.6.32-300.7.1.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.7.1.el6uek.i686.rpm
kernel-uek-debug-2.6.32-300.7.1.el6uek.i686.rpm
ofa-2.6.32-300.7.1.el6uek-1.5.1-4.0.47.i686.rpm
ofa-2.6.32-300.7.1.el6uekdebug-1.5.1-4.0.47.i686.rpm
mlnx_en-2.6.32-300.7.1.el6uek-1.5.7-0.1.i686.rpm
mlnx_en-2.6.32-300.7.1.el6uekdebug-1.5.7-0.1.i686.rpm
x86_64:
kernel-uek-firmware-2.6.32-300.7.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-300.7.1.el6uek.noarch.rpm
kernel-uek-2.6.32-300.7.1.el6uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.7.1.el6uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.7.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.7.1.el6uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.7.1.el6uek.x86_64.rpm
ofa-2.6.32-300.7.1.el6uek-1.5.1-4.0.47.x86_64.rpm
ofa-2.6.32-300.7.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm
mlnx_en-2.6.32-300.7.1.el6uek-1.5.7-0.1.x86_64.rpm
mlnx_en-2.6.32-300.7.1.el6uekdebug-1.5.7-0.1.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.32-300.7.1.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/ofa-2.6.32-300.7.1.el6uek-1.5.1-4.0.47.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/mlnx_en-2.6.32-300.7.1.el6uek-1.5.7-0.1.src.rpm
Users with Oracle Linux Premier Support can now use Ksplice to patch
against this Security Advisory.
We recommend that all users of Oracle Linux 6 install these updates.
Users of Ksplice Uptrack can install these updates by running :
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
Description of changes:
* Improved fix for CVE-2010-2962.
The original upstream fix for CVE-2010-2962 had an overflow bug in its
bounds checking.
* CVE-2012-0056: Privilege escalation in /proc/[pid]/mem writing.
It was found that permissions were not checked properly in the Linux
kernel when handling the /proc/[pid]/mem writing functionality. A
local, unprivileged user could use this flaw to escalate their
privileges.
[2.6.32-300.7.1.el6uek]
- Revert "proc: enable writing to /proc/pid/mem" [orabug 13619701]
{CVE-2012-0056}
- [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable
(Suresh Siddha)
[2.6.32-300.6.1.el6uek]
- tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov)
[orabug 13611655]
[2.6.32-300.5.1.el6uek]
- sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi)
[orabug 13604567]
- [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin)
[orabug 13492670]
- drm/i915: Rephrase pwrite bounds checking to avoid any potential
overflow (Chris Wilson) [CVE-2010-296]
- x2apic: Enable the bios request for x2apic optout (Suresh Siddha)
[orabug 13565303]
- fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug
10004611]
- fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611]
More information about the El-errata
mailing list