[El-errata] ELSA-2013-2534 Moderate: Oracle Linux 6 Unbreakable Enterprise kernel security update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Wed Jun 12 13:18:51 PDT 2013
Oracle Linux Security Advisory ELSA-2013-2534
The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:
i386:
kernel-uek-2.6.32-400.29.1.el6uek.i686.rpm
kernel-uek-debug-2.6.32-400.29.1.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.32-400.29.1.el6uek.i686.rpm
kernel-uek-headers-2.6.32-400.29.1.el6uek.i686.rpm
kernel-uek-devel-2.6.32-400.29.1.el6uek.i686.rpm
kernel-uek-doc-2.6.32-400.29.1.el6uek.noarch.rpm
kernel-uek-firmware-2.6.32-400.29.1.el6uek.noarch.rpm
ofa-2.6.32-400.29.1.el6uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-400.29.1.el6uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-400.29.1.el6uek-1.5.7-0.1.i686.rpm
mlnx_en-2.6.32-400.29.1.el6uekdebug-1.5.7-0.1.i686.rpm
x86_64:
kernel-uek-firmware-2.6.32-400.29.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-400.29.1.el6uek.noarch.rpm
kernel-uek-2.6.32-400.29.1.el6uek.x86_64.rpm
kernel-uek-headers-2.6.32-400.29.1.el6uek.x86_64.rpm
kernel-uek-devel-2.6.32-400.29.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-400.29.1.el6uek.x86_64.rpm
kernel-uek-debug-2.6.32-400.29.1.el6uek.x86_64.rpm
ofa-2.6.32-400.29.1.el6uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-400.29.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-400.29.1.el6uek-1.5.7-0.1.x86_64.rpm
mlnx_en-2.6.32-400.29.1.el6uekdebug-1.5.7-0.1.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.32-400.29.1.el6uek.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/ofa-2.6.32-400.29.1.el6uek-1.5.1-4.0.58.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/mlnx_en-2.6.32-400.29.1.el6uek-1.5.7-0.1.src.rpm
Description of changes:
[2.6.32-400.29.1.el6uek]
- KVM: add missing void __user COPYING CREDITS Documentation Kbuild
MAINTAINERS Makefile README REPORTING-BUGS arch block crypto drivers
firmware fs include init ipc kernel lib mm net samples scripts security
sound tools uek-rpm usr virt cast to access_ok() call (Heiko Carstens)
[Orabug: 16941620] {CVE-2013-1943}
- KVM: Validate userspace_addr of memslot when registered (Takuya
Yoshikawa) [Orabug: 16941620] {CVE-2013-1943}
[2.6.32-400.28.1.el6uek]
- do_add_mount()/umount -l races (Jerry Snitselaar) [Orabug: 16311974]
- tg3: fix length overflow in VPD firmware parsing (Kees Cook) [Orabug:
16837019] {CVE-2013-1929}
- USB: cdc-wdm: fix buffer overflow (Oliver Neukum) [Orabug: 16837003]
{CVE-2013-1860}
- bonding: emit event when bonding changes MAC (Weiping Pan) [Orabug:
16579025]
- sched: Fix ancient race in do_exit() (Joe Jin)
- open debug in page_move_anon_rmap by default. (Xiaowei.Hu) [Orabug:
14046035]
- block: default SCSI command filter does not accomodate commands
overlap across device classes (Jamie Iles) [Orabug: 16387136]
{CVE-2012-4542}
- vma_adjust: fix the copying of anon_vma chains (Linus Torvalds)
[Orabug: 14046035]
- xen-netfront: delay gARP until backend switches to Connected (Laszlo
Ersek) [Orabug: 16182568]
- svcrpc: don't hold sv_lock over svc_xprt_put() (J. Bruce Fields)
[Orabug: 16032824]
- mm/hotplug: correctly add new zone to all other nodes' zone lists
(Jiang Liu) [Orabug: 16603569] {CVE-2012-5517}
- ptrace: ptrace_resume() shouldn't wake up !TASK_TRACED thread (Oleg
Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL
(Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()
(Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson
Lizardo) [Orabug: 16711062] {CVE-2013-0349}
- dccp: check ccid before dereferencing (Mathias Krause) [Orabug:
16711040] {CVE-2013-1827}
- USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch)
[Orabug: 16425435] {CVE-2013-1774}
- keys: fix race with concurrent install_user_keyrings() (David Howells)
[Orabug: 16493369] {CVE-2013-1792}
- KVM: Fix bounds checking in ioapic indirect register reads
(CVE-2013-1798) (Andy Honig) [Orabug: 16710937] {CVE-2013-1798}
- KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME
(CVE-2013-1796) (Jerry Snitselaar) [Orabug: 16710794] {CVE-2013-1796}
[2.6.32-400.27.1.el6uek]
- net/tun: fix ioctl() based info leaks (Mathias Krause) [Orabug:
16675501] {CVE-2012-6547}
- atm: fix info leak via getsockname() (Mathias Krause) [Orabug:
16675501] {CVE-2012-6546}
- atm: fix info leak in getsockopt(SO_ATMPVC) (Mathias Krause) [Orabug:
16675501] {CVE-2012-6546}
- xfrm_user: fix info leak in copy_to_user_tmpl() (Mathias Krause)
[Orabug: 16675501] {CVE-2012-6537}
- xfrm_user: fix info leak in copy_to_user_policy() (Mathias Krause)
[Orabug: 16675501] {CVE-2012-6537}
- xfrm_user: fix info leak in copy_to_user_state() (Mathias Krause)
[Orabug: 16675501] {CVE-2013-6537}
- xfrm_user: return error pointer instead of NULL #2 (Mathias Krause)
[Orabug: 16675501] {CVE-2013-1826}
- xfrm_user: return error pointer instead of NULL (Mathias Krause)
[Orabug: 16675501] {CVE-2013-1826}
- llc: fix info leak via getsockname() (Mathias Krause) [Orabug:
16675501] {CVE-2012-6542}
- x86/mm: Check if PUD is large when validating a kernel address (Mel
Gorman) [Orabug: 14251997]
More information about the El-errata
mailing list