User: Password:
Subscribe / Log in / New account

Oracle alert ELSA-2012-2001 (kernel-uek)

From:  Errata Announcements for Oracle Linux <>
Subject:  [El-errata] ELSA-2012-2001 Important: Oracle Linux 5 Unbreakable Enterprise kernel security and bug fix update
Date:  Wed, 25 Jan 2012 16:06:36 -0800
Message-ID:  <>
Archive-link:  Article, Thread

Oracle Linux Security Advisory ELSA-2012-2001 The following updated rpms for Oracle Linux 5 have been uploaded to the Unbreakable Linux Network: i386: kernel-uek-2.6.32-300.7.1.el5uek.i686.rpm kernel-uek-debug-2.6.32-300.7.1.el5uek.i686.rpm kernel-uek-debug-devel-2.6.32-300.7.1.el5uek.i686.rpm kernel-uek-headers-2.6.32-300.7.1.el5uek.i686.rpm kernel-uek-devel-2.6.32-300.7.1.el5uek.i686.rpm kernel-uek-doc-2.6.32-300.7.1.el5uek.noarch.rpm kernel-uek-firmware-2.6.32-300.7.1.el5uek.noarch.rpm ofa-2.6.32-300.7.1.el5uek-1.5.1-4.0.53.i686.rpm ofa-2.6.32-300.7.1.el5uekdebug-1.5.1-4.0.53.i686.rpm x86_64: kernel-uek-firmware-2.6.32-300.7.1.el5uek.noarch.rpm kernel-uek-doc-2.6.32-300.7.1.el5uek.noarch.rpm kernel-uek-2.6.32-300.7.1.el5uek.x86_64.rpm kernel-uek-headers-2.6.32-300.7.1.el5uek.x86_64.rpm kernel-uek-devel-2.6.32-300.7.1.el5uek.x86_64.rpm kernel-uek-debug-devel-2.6.32-300.7.1.el5uek.x86_64.rpm kernel-uek-debug-2.6.32-300.7.1.el5uek.x86_64.rpm ofa-2.6.32-300.7.1.el5uek-1.5.1-4.0.53.x86_64.rpm ofa-2.6.32-300.7.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm SRPMS: Users with Oracle Linux Premier Support can now use Ksplice to patch against this Security Advisory. We recommend that all users of Oracle Linux 5 install these updates. Users of Ksplice Uptrack can install these updates by running : # /usr/sbin/uptrack-upgrade -y On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any additional action. Description of changes: * Improved fix for CVE-2010-2962. The original upstream fix for CVE-2010-2962 had an overflow bug in its bounds checking. * CVE-2012-0056: Privilege escalation in /proc/[pid]/mem writing. It was found that permissions were not checked properly in the Linux kernel when handling the /proc/[pid]/mem writing functionality. A local, unprivileged user could use this flaw to escalate their privileges. [2.6.32-300.7.1.el5uek] - Revert "proc: enable writing to /proc/pid/mem" [orabug 13619701] {CVE-2012-0056} - [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable (Suresh Siddha) [2.6.32-300.6.1.el5uek] - tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov) [orabug 13611655] [2.6.32-300.5.1.el5uek] - sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) [orabug 13604567] - [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin) [orabug 13492670] - drm/i915: Rephrase pwrite bounds checking to avoid any potential overflow (Chris Wilson) [CVE-2010-296] - x2apic: Enable the bios request for x2apic optout (Suresh Siddha) [orabug 13565303] - fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 10004611] - fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611] _______________________________________________ El-errata mailing list

(Log in to post comments)

Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds