[El-errata] ELSA-2012-2014 Moderate: Oracle Linux 5 Unbreakable Enterprise kernel security update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon May 21 16:02:37 PDT 2012
Oracle Linux Security Advisory ELSA-2012-2014
The following updated rpms for Oracle Linux 5 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-2.6.32-300.25.1.el5uek.i686.rpm
kernel-uek-debug-2.6.32-300.25.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.25.1.el5uek.i686.rpm
kernel-uek-headers-2.6.32-300.25.1.el5uek.i686.rpm
kernel-uek-devel-2.6.32-300.25.1.el5uek.i686.rpm
kernel-uek-doc-2.6.32-300.25.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.32-300.25.1.el5uek.noarch.rpm
ofa-2.6.32-300.25.1.el5uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-300.25.1.el5uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-300.25.1.el5uek-1.5.7-2.i686.rpm
mlnx_en-2.6.32-300.25.1.el5uekdebug-1.5.7-2.i686.rpm
x86_64:
kernel-uek-firmware-2.6.32-300.25.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.32-300.25.1.el5uek.noarch.rpm
kernel-uek-2.6.32-300.25.1.el5uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.25.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.25.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.25.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.25.1.el5uek.x86_64.rpm
ofa-2.6.32-300.25.1.el5uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-300.25.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-300.25.1.el5uek-1.5.7-2.x86_64.rpm
mlnx_en-2.6.32-300.25.1.el5uekdebug-1.5.7-2.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-300.25.1.el5uek.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-300.25.1.el5uek-1.5.1-4.0.58.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/mlnx_en-2.6.32-300.25.1.el5uek-1.5.7-2.src.rpm
Users with Oracle Linux Premier Support can now use Ksplice to patch
against this Security Advisory.
We recommend that all users of Oracle Linux 5 install these updates.
Users of Ksplice Uptrack can install these updates by running :
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
Description of changes:
* CVE-2011-4086: Denial of service in journaling block device.
The journal block device assumed that a buffer marked as unwritten
or delay could be live without checking if the buffer was mapped.
An unprivileged local user could use this flaw to crash the system.
[2.6.32-300.25.1.el5uek]
- jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer (Eric Sandeen)
[Bugdb: 13871] {CVE-2011-4086}
More information about the El-errata
mailing list