[El-errata] ELSA-2012-2020 Important: Oracle Linux 5 Unbreakable Enterprise kernel security and bugfix update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Jun 21 15:10:57 PDT 2012


Oracle Linux Security Advisory ELSA-2012-2020

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-300.27.1.el5uek.i686.rpm
kernel-uek-debug-2.6.32-300.27.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.27.1.el5uek.i686.rpm
kernel-uek-headers-2.6.32-300.27.1.el5uek.i686.rpm
kernel-uek-devel-2.6.32-300.27.1.el5uek.i686.rpm
kernel-uek-doc-2.6.32-300.27.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.32-300.27.1.el5uek.noarch.rpm
ofa-2.6.32-300.27.1.el5uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-300.27.1.el5uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-300.27.1.el5uek-1.5.7-2.i686.rpm
mlnx_en-2.6.32-300.27.1.el5uekdebug-1.5.7-2.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-300.27.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.32-300.27.1.el5uek.noarch.rpm
kernel-uek-2.6.32-300.27.1.el5uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.27.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.27.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.27.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.27.1.el5uek.x86_64.rpm
ofa-2.6.32-300.27.1.el5uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-300.27.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-300.27.1.el5uek-1.5.7-2.x86_64.rpm
mlnx_en-2.6.32-300.27.1.el5uekdebug-1.5.7-2.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-300.27.1.el5uek.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-300.27.1.el5uek-1.5.1-4.0.58.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/mlnx_en-2.6.32-300.27.1.el5uek-1.5.7-2.src.rpm

Users with Oracle Linux Premier Support can now use Ksplice to patch
against this Security Advisory.

We recommend that all users of  Oracle Linux 5 install these updates.

Users of Ksplice Uptrack can install these updates by running :

# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.

Description of changes:

* CVE-2012-2123: Privilege escalation when assigning permissions using 
fcaps.

If a process increases permissions using fcaps, all of the dangerous
personality flags which are cleared for suid apps are not cleared. This has
allowed programs that gained elevated permissions using fcaps to disable
the address space randomization of other processes.


* CVE-2012-2121: Memory leak in KVM device assignment.

KVM uses memory slots to track and map guest regions of memory.  When device
assignment is used, the pages backing these slots are pinned in memory 
and mapped
into the iommu.  The problem is that when a memory slot is destroyed the 
pages
for the associated memory slot are neither unpinned nor unmapped from 
the iommu.


* Memory corruption in KVM device assignment slot handling.

A race condition in the KVM device assignment slot handling caused by
missing locks around the unmapping of memory slots could cause a memory
corruption.


* CVE-2012-2136: Privilege escalation in TUN/TAP virtual device.

The length of packet fragments to be sent wasn't validated before use,
leading to heap overflow. A user having access to TUN/TAP virtual
device could use this flaw to crash the system or to potentially
escalate their privileges.


* CVE-2012-2137: Buffer overflow in KVM MSI routing entry handler.

A buffer overflow flaw was found in the setup_routing_entry() function 
in the
KVM subsystem of the Linux kernel in the way the Message Signaled Interrupts
(MSI) routing entry was handled. A local, unprivileged user could use 
this flaw
to cause a denial of service or, possibly, escalate their privileges.


* CVE-2012-1179 and CVE-2012-2373: Hugepage denial of service.

CVE-2012-1179: Denial of service in page mapping of the hugepage subsystem.

In some cases, the hugepage subsystem would allocate new PMDs when not
expected by the memory management subsystem. A privileged user in the
KVM guest can use this flaw to crash the host, an unprivileged local
user could use this flaw to crash the system.

CVE-2012-2373: Denial of service in PAE page tables.

On a PAE system, a non-atomic load could be corrupted by a page fault
resulting in a kernel crash, triggerable by an unprivileged user.


* Regression in handling of bind() with AF_UNSPEC family sockets.

Legacy applications used to bind() with AF_UNSPEC instead of AF_INET. Allow
them to continue doing so, but verify that the address is indeed INADDR_ANY.

[2.6.32-300.27.1.el5uek]
- net: sock: validate data_len before allocating skb (Jason Wang) 
[Bugdb: 13966]{CVE-2012-2136}
- fcaps: clear the same personality flags as suid when fcaps are used 
(Eric Paris) [Bugdb: 13966] {CVE-2012-2123}
- Revert "nfs: when attempting to open a directory, fall back on normal 
lookup (Todd Vierling) [Orabug 14141154]

[2.6.32-300.26.1.el5uek]
- mptsas: do not call __mptsas_probe in kthread (Maxim Uvarov) [Orabug:
   14175509]
- mm: check if any page in a pageblock is reserved before marking it
   MIGRATE_RESERVE (Maxim Uvarov) [Orabug: 14073214]
- mm: reduce the amount of work done when updating min_free_kbytes (Mel 
Gorman)
   [Orabug: 14073214]
- vmxnet3: Updated to el6-u2 (Guangyu Sun) [Orabug: 14027961]
- xen: expose host uuid via sysfs. (Zhigang Wang)
- sched: Fix cgroup movement of waking process (Daisuke Nishimura) [Orabug:
   13946210]
- sched: Fix cgroup movement of newly created process (Daisuke Nishimura)
   [Orabug: 13946210]
- sched: Fix cgroup movement of forking process (Daisuke Nishimura) [Orabug:
   13946210]
- x86, boot: Wait for boot cpu to show up if nr_cpus limit is about to hit
   (Zhenzhong Duan) [Orabug: 13629087]
- smp: Use nr_cpus= to set nr_cpu_ids early (Zhenzhong Duan) [Orabug: 
13629087]
- net: ipv4: relax AF_INET check in bind() (Maxim Uvarov) [Orabug: 14054411]





More information about the El-errata mailing list