User: Password:
|
|
Subscribe / Log in / New account

Oracle alert ELSA-2012-2001 (kernel-uek)

From:  Errata Announcements for Oracle Linux <el-errata@oracle.com>
To:  el-errata@oss.oracle.com
Subject:  [El-errata] ELSA-2012-2001 Important: Oracle Linux 6 Unbreakable Enterprise kernel security and bug fix update
Date:  Wed, 25 Jan 2012 16:06:22 -0800
Message-ID:  <4F2098FE.3060803@oracle.com>
Archive-link:  Article, Thread

Oracle Linux Security Advisory ELSA-2012-2001 The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network: i386: kernel-uek-firmware-2.6.32-300.7.1.el6uek.noarch.rpm kernel-uek-doc-2.6.32-300.7.1.el6uek.noarch.rpm kernel-uek-2.6.32-300.7.1.el6uek.i686.rpm kernel-uek-headers-2.6.32-300.7.1.el6uek.i686.rpm kernel-uek-devel-2.6.32-300.7.1.el6uek.i686.rpm kernel-uek-debug-devel-2.6.32-300.7.1.el6uek.i686.rpm kernel-uek-debug-2.6.32-300.7.1.el6uek.i686.rpm ofa-2.6.32-300.7.1.el6uek-1.5.1-4.0.47.i686.rpm ofa-2.6.32-300.7.1.el6uekdebug-1.5.1-4.0.47.i686.rpm mlnx_en-2.6.32-300.7.1.el6uek-1.5.7-0.1.i686.rpm mlnx_en-2.6.32-300.7.1.el6uekdebug-1.5.7-0.1.i686.rpm x86_64: kernel-uek-firmware-2.6.32-300.7.1.el6uek.noarch.rpm kernel-uek-doc-2.6.32-300.7.1.el6uek.noarch.rpm kernel-uek-2.6.32-300.7.1.el6uek.x86_64.rpm kernel-uek-headers-2.6.32-300.7.1.el6uek.x86_64.rpm kernel-uek-devel-2.6.32-300.7.1.el6uek.x86_64.rpm kernel-uek-debug-devel-2.6.32-300.7.1.el6uek.x86_64.rpm kernel-uek-debug-2.6.32-300.7.1.el6uek.x86_64.rpm ofa-2.6.32-300.7.1.el6uek-1.5.1-4.0.47.x86_64.rpm ofa-2.6.32-300.7.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm mlnx_en-2.6.32-300.7.1.el6uek-1.5.7-0.1.x86_64.rpm mlnx_en-2.6.32-300.7.1.el6uekdebug-1.5.7-0.1.x86_64.rpm SRPMS: http://oss.oracle.com/ol6/SRPMS-updates/kernel-uek-2.6.32... http://oss.oracle.com/ol6/SRPMS-updates/ofa-2.6.32-300.7.... http://oss.oracle.com/ol6/SRPMS-updates/mlnx_en-2.6.32-30... Users with Oracle Linux Premier Support can now use Ksplice to patch against this Security Advisory. We recommend that all users of Oracle Linux 6 install these updates. Users of Ksplice Uptrack can install these updates by running : # /usr/sbin/uptrack-upgrade -y On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any additional action. Description of changes: * Improved fix for CVE-2010-2962. The original upstream fix for CVE-2010-2962 had an overflow bug in its bounds checking. * CVE-2012-0056: Privilege escalation in /proc/[pid]/mem writing. It was found that permissions were not checked properly in the Linux kernel when handling the /proc/[pid]/mem writing functionality. A local, unprivileged user could use this flaw to escalate their privileges. [2.6.32-300.7.1.el6uek] - Revert "proc: enable writing to /proc/pid/mem" [orabug 13619701] {CVE-2012-0056} - [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable (Suresh Siddha) [2.6.32-300.6.1.el6uek] - tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov) [orabug 13611655] [2.6.32-300.5.1.el6uek] - sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) [orabug 13604567] - [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin) [orabug 13492670] - drm/i915: Rephrase pwrite bounds checking to avoid any potential overflow (Chris Wilson) [CVE-2010-296] - x2apic: Enable the bios request for x2apic optout (Suresh Siddha) [orabug 13565303] - fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 10004611] - fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611] _______________________________________________ El-errata mailing list El-errata@oss.oracle.com http://oss.oracle.com/mailman/listinfo/el-errata


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds