[El-errata] ELSA-2012-1061 Moderate: Oracle Linux 5 kernel security and bug fix update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Jul 11 16:21:55 PDT 2012


Oracle Linux Security Advisory ELSA-2012-1061

https://rhn.redhat.com/errata/RHSA-2012-1061.html

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-2.6.18-308.11.1.el5.i686.rpm
kernel-PAE-2.6.18-308.11.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-308.11.1.el5.i686.rpm
kernel-debug-2.6.18-308.11.1.el5.i686.rpm
kernel-debug-devel-2.6.18-308.11.1.el5.i686.rpm
kernel-devel-2.6.18-308.11.1.el5.i686.rpm
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm
kernel-headers-2.6.18-308.11.1.el5.i386.rpm
kernel-xen-2.6.18-308.11.1.el5.i686.rpm
kernel-xen-devel-2.6.18-308.11.1.el5.i686.rpm

x86_64:
kernel-2.6.18-308.11.1.el5.x86_64.rpm
kernel-debug-2.6.18-308.11.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-308.11.1.el5.x86_64.rpm
kernel-devel-2.6.18-308.11.1.el5.x86_64.rpm
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm
kernel-headers-2.6.18-308.11.1.el5.x86_64.rpm
kernel-xen-2.6.18-308.11.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-308.11.1.el5.x86_64.rpm

ia64:
kernel-2.6.18-308.11.1.el5.ia64.rpm
kernel-debug-2.6.18-308.11.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-308.11.1.el5.ia64.rpm
kernel-devel-2.6.18-308.11.1.el5.ia64.rpm
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm
kernel-headers-2.6.18-308.11.1.el5.ia64.rpm
kernel-xen-2.6.18-308.11.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-308.11.1.el5.ia64.rpm


SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-2.6.18-308.11.1.el5.src.rpm

The following packages were rebuilt to be in sync with the updated 
kernel version (no changes other than updating the version number):

i386:
oracleasm-2.6.18-308.11.1.el5-2.0.5-1.el5.i686.rpm
oracleasm-2.6.18-308.11.1.el5PAE-2.0.5-1.el5.i686.rpm
oracleasm-2.6.18-308.11.1.el5xen-2.0.5-1.el5.i686.rpm
oracleasm-2.6.18-308.11.1.el5debug-2.0.5-1.el5.i686.rpm
ocfs2-2.6.18-308.11.1.el5-1.4.10-1.el5.i686.rpm
ocfs2-2.6.18-308.11.1.el5PAE-1.4.10-1.el5.i686.rpm
ocfs2-2.6.18-308.11.1.el5xen-1.4.10-1.el5.i686.rpm
ocfs2-2.6.18-308.11.1.el5debug-1.4.10-1.el5.i686.rpm

x86_64:
oracleasm-2.6.18-308.11.1.el5-2.0.5-1.el5.x86_64.rpm
oracleasm-2.6.18-308.11.1.el5xen-2.0.5-1.el5.x86_64.rpm
oracleasm-2.6.18-308.11.1.el5debug-2.0.5-1.el5.x86_64.rpm
ocfs2-2.6.18-308.11.1.el5-1.4.10-1.el5.x86_64.rpm
ocfs2-2.6.18-308.11.1.el5xen-1.4.10-1.el5.x86_64.rpm
ocfs2-2.6.18-308.11.1.el5debug-1.4.10-1.el5.x86_64.rpm

ia64:
oracleasm-2.6.18-308.11.1.el5-2.0.5-1.el5.ia64.rpm
oracleasm-2.6.18-308.11.1.el5xen-2.0.5-1.el5.ia64.rpm
oracleasm-2.6.18-308.11.1.el5debug-2.0.5-1.el5.ia64.rpm
ocfs2-2.6.18-308.11.1.el5-1.4.10-1.el5.ia64.rpm
ocfs2-2.6.18-308.11.1.el5xen-1.4.10-1.el5.ia64.rpm
ocfs2-2.6.18-308.11.1.el5debug-1.4.10-1.el5.ia64.rpm


SRPMS:
http://oss.oracle.com/el5/SRPMS-updates/oracleasm-2.6.18-308.11.1.el5-2.0.5-1.el5.src.rpm
http://oss.oracle.com/el5/SRPMS-updates/ocfs2-2.6.18-308.11.1.el5-1.4.10-1.el5.src.rpm

Users with Oracle Linux Premier Support can now use Ksplice to patch
against this Security Advisory.

We recommend that all users of  Oracle Linux 5 install these updates.

Users of Ksplice Uptrack can install these updates by running :

# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.

Description of changes:

* CVE-2012-3375: Denial of service due to epoll resource leak in error path.

The upstream fix for CVE-2011-1083 introduced a flaw in the way
the Linux kernel's Event Poll (epoll) subsystem handled resource clean up
when an ELOOP error code was returned. A local, unprivileged user could use
this flaw to cause a denial of service.


* Arithmetic overflow in clock source calculations.

An insufficiently designed calculation in the CPU accelerator in the
previous kernel caused an arithmetic overflow in the sched_clock()
function when system uptime exceeded 208.5 days. This overflow led to
a kernel panic on the systems using the Time Stamp Counter (TSC) or
Virtual Machine Interface (VMI) clock source. This update corrects the
aforementioned calculation so that this arithmetic overflow and kernel
panic can no longer occur under these circumstances.


[2.6.18-308.11.1.el5]
- [net] ixgbe: remove flow director stats (Andy Gospodarek) [832169 830226]
- [net] ixgbe: fix default return value for ixgbe_cache_ring_fdir (Andy 
Gospodarek) [832169 830226]
- [net] ixgbe: reverting setup redirection table for multiple packet 
buffers (Andy Gospodarek) [832169 830226]

[2.6.18-308.10.1.el5]
- [xen] x86_64: check address on trap handlers or guest callbacks (Paolo 
Bonzini) [813430 813431] {CVE-2012-0217}
- [xen] x86_64: Do not execute sysret with a non-canonical return 
address (Paolo Bonzini) [813430 813431] {CVE-2012-0217}
- [xen] x86: prevent hv boot on AMD CPUs with Erratum 121 (Laszlo Ersek) 
[824969 824970] {CVE-2012-2934}
- [scsi] qla2xxx: Use ha->pdev->revision in 4Gbps MSI-X check. (Chad 
Dupuis) [816373 800653]
- [fs] sunrpc: do array overrun check in svc_recv before page alloc (J. 
Bruce Fields) [820358 814626]
- [fs] knfsd: fix an NFSD bug with full size non-page-aligned reads (J. 
Bruce Fields) [820358 814626]
- [fs] sunrpc: fix oops due to overrunning server's page array (J. Bruce 
Fields) [820358 814626]
- [fs] epoll: clear the tfile_check_list on -ELOOP (Jason Baron) [829670 
817131]
- [x86_64] sched: Avoid unnecessary overflow in sched_clock (Prarit 
Bhargava) [824654 818787]
- [net] sunrpc: Don't use list_for_each_entry_safe in rpc_wake_up (Steve 
Dickson) [817571 809937]
- [s390] qeth: add missing wake_up call (Hendrik Brueckner) [829059 790900]

[2.6.18-308.9.1.el5]
- [fs] jbd: clear b_modified before moving the jh to a different 
transaction (Josef Bacik) [827205 563247]





More information about the El-errata mailing list