User: Password:
Subscribe / Log in / New account

Oracle alert ELSA-2012-2007 (enterprise kernel)

From:  Errata Announcements for Oracle Linux <>
Subject:  [El-errata] ELSA-2012-2007 Moderate: Oracle Linux 6 Unbreakable Enterprise kernel security and bug fix update
Date:  Mon, 23 Apr 2012 13:20:49 -0700
Message-ID:  <>
Archive-link:  Article, Thread

Oracle Linux Security Advisory ELSA-2012-2007 The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network: i386: kernel-uek-firmware-2.6.32-300.21.1.el6uek.noarch.rpm kernel-uek-doc-2.6.32-300.21.1.el6uek.noarch.rpm kernel-uek-2.6.32-300.21.1.el6uek.i686.rpm kernel-uek-headers-2.6.32-300.21.1.el6uek.i686.rpm kernel-uek-devel-2.6.32-300.21.1.el6uek.i686.rpm kernel-uek-debug-devel-2.6.32-300.21.1.el6uek.i686.rpm kernel-uek-debug-2.6.32-300.21.1.el6uek.i686.rpm ofa-2.6.32-300.21.1.el6uek-1.5.1-4.0.47.i686.rpm ofa-2.6.32-300.21.1.el6uekdebug-1.5.1-4.0.47.i686.rpm mlnx_en-2.6.32-300.21.1.el6uek-1.5.7-0.1.i686.rpm mlnx_en-2.6.32-300.21.1.el6uekdebug-1.5.7-0.1.i686.rpm x86_64: kernel-uek-firmware-2.6.32-300.21.1.el6uek.noarch.rpm kernel-uek-doc-2.6.32-300.21.1.el6uek.noarch.rpm kernel-uek-2.6.32-300.21.1.el6uek.x86_64.rpm kernel-uek-headers-2.6.32-300.21.1.el6uek.x86_64.rpm kernel-uek-devel-2.6.32-300.21.1.el6uek.x86_64.rpm kernel-uek-debug-devel-2.6.32-300.21.1.el6uek.x86_64.rpm kernel-uek-debug-2.6.32-300.21.1.el6uek.x86_64.rpm ofa-2.6.32-300.21.1.el6uek-1.5.1-4.0.47.x86_64.rpm ofa-2.6.32-300.21.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm mlnx_en-2.6.32-300.21.1.el6uek-1.5.7-0.1.x86_64.rpm mlnx_en-2.6.32-300.21.1.el6uekdebug-1.5.7-0.1.x86_64.rpm SRPMS: Users with Oracle Linux Premier Support can now use Ksplice to patch against this Security Advisory. We recommend that all users of Oracle Linux 6 install these updates. Users of Ksplice Uptrack can install these updates by running : # /usr/sbin/uptrack-upgrade -y On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any additional action. Description of changes: * CVE-2012-0879: Denial of service in CLONE_IO. CLONE_IO reference counting error could be exploited by an unprivileged local user to cause denial of service. * CVE-2012-1097: NULL pointer dereference in the ptrace subsystem. Under certain circumstances, ptrace-ing a process could lead to a NULL pointer dereference and kernel panic. * CVE-2012-1090: Denial of service in the CIFS filesystem reference counting. Under certain circumstances, the CIFS filesystem would open a file on lookup. If the file was determined later to be a FIFO or any other special file the file handle would be leaked, leading to reference counting mismatch and a kernel OOPS on unmount. An unprivileged local user could use this flaw to crash the system. kernel-uek: [2.6.32-300.21.1.el6uek] - regset: Return -EFAULT, not -EIO, on host-side memory fault (H. Peter Anvin) CVE-2012-1097 - regset: Prevent null pointer reference on readonly regsets (H. Peter Anvin) CVE-2012-1097 - cifs: fix dentry refcount leak when opening a FIFO on lookup (Jeff Layton) CVE-2012-1090 - block: Fix io_context leak after failure of clone with CLONE_IO (Louis Rilling) CVE-2012-0879 _______________________________________________ El-errata mailing list

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds