[El-errata] ELSA-2012-2001 Important: Oracle Linux 5 Unbreakable Enterprise kernel security and bug fix update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Jan 25 16:06:36 PST 2012


Oracle Linux Security Advisory ELSA-2012-2001

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-300.7.1.el5uek.i686.rpm
kernel-uek-debug-2.6.32-300.7.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.7.1.el5uek.i686.rpm
kernel-uek-headers-2.6.32-300.7.1.el5uek.i686.rpm
kernel-uek-devel-2.6.32-300.7.1.el5uek.i686.rpm
kernel-uek-doc-2.6.32-300.7.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.32-300.7.1.el5uek.noarch.rpm
ofa-2.6.32-300.7.1.el5uek-1.5.1-4.0.53.i686.rpm
ofa-2.6.32-300.7.1.el5uekdebug-1.5.1-4.0.53.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-300.7.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.32-300.7.1.el5uek.noarch.rpm
kernel-uek-2.6.32-300.7.1.el5uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.7.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.7.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.7.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.7.1.el5uek.x86_64.rpm
ofa-2.6.32-300.7.1.el5uek-1.5.1-4.0.53.x86_64.rpm
ofa-2.6.32-300.7.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-300.7.1.el5uek.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-300.7.1.el5uek-1.5.1-4.0.53.src.rpm

Users with Oracle Linux Premier Support can now use Ksplice to patch
against this Security Advisory.

We recommend that all users of  Oracle Linux 5 install these updates.

Users of Ksplice Uptrack can install these updates by running :

# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.


Description of changes:

* Improved fix for CVE-2010-2962.

The original upstream fix for CVE-2010-2962 had an overflow bug in its
bounds checking.


* CVE-2012-0056: Privilege escalation in /proc/[pid]/mem writing.

It was found that permissions were not checked properly in the Linux
kernel when handling the /proc/[pid]/mem writing functionality.  A
local, unprivileged user could use this flaw to escalate their
privileges.


[2.6.32-300.7.1.el5uek]
- Revert "proc: enable writing to /proc/pid/mem" [orabug 13619701] 
{CVE-2012-0056}
- [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable 
(Suresh Siddha)

[2.6.32-300.6.1.el5uek]
- tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov) 
[orabug 13611655]

[2.6.32-300.5.1.el5uek]
- sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) 
[orabug 13604567]
- [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin) 
[orabug 13492670]
- drm/i915: Rephrase pwrite bounds checking to avoid any potential 
overflow (Chris Wilson) [CVE-2010-296]
- x2apic: Enable the bios request for x2apic optout (Suresh Siddha) 
[orabug 13565303]
- fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 
10004611]
- fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611]





More information about the El-errata mailing list