Oracle alert ELSA-2012-2025 (kernel)
From: | Errata Announcements for Oracle Linux <el-errata@oss.oracle.com> | |
To: | el-errata@oss.oracle.com | |
Subject: | [El-errata] ELSA-2012-2025 Important: Oracle Linux 5 Unbreakable Enterprise kernel Security update | |
Date: | Wed, 18 Jul 2012 12:06:32 -0700 | |
Message-ID: | <50070938.5070201@oracle.com> |
Oracle Linux Security Advisory ELSA-2012-2025 The following updated rpms for Oracle Linux 5 have been uploaded to the Unbreakable Linux Network: i386: kernel-uek-2.6.39-200.29.2.el5uek.i686.rpm kernel-uek-debug-2.6.39-200.29.2.el5uek.i686.rpm kernel-uek-debug-devel-2.6.39-200.29.2.el5uek.i686.rpm kernel-uek-devel-2.6.39-200.29.2.el5uek.i686.rpm kernel-uek-doc-2.6.39-200.29.2.el5uek.noarch.rpm kernel-uek-firmware-2.6.39-200.29.2.el5uek.noarch.rpm x86_64: kernel-uek-firmware-2.6.39-200.29.2.el5uek.noarch.rpm kernel-uek-doc-2.6.39-200.29.2.el5uek.noarch.rpm kernel-uek-2.6.39-200.29.2.el5uek.x86_64.rpm kernel-uek-devel-2.6.39-200.29.2.el5uek.x86_64.rpm kernel-uek-debug-devel-2.6.39-200.29.2.el5uek.x86_64.rpm kernel-uek-debug-2.6.39-200.29.2.el5uek.x86_64.rpm SRPMS: http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.39... Users with Oracle Linux Premier Support can now use Ksplice to patch against this Security Advisory. We recommend that all users of Oracle Linux 5 install these updates. Users of Ksplice Uptrack can install these updates by running : # /usr/sbin/uptrack-upgrade -y On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any additional action. Description of changes: * CVE-2012-2745: Denial-of-service in kernel key management. A potential double-free of the replacement session keyring on fork() could result in a denial-of-service by a local, unprivileged user. * CVE-2011-1083: Algorithmic denial of service in epoll. A flaw was found in the way the Linux kernel's Event Poll (epoll) subsystem handled large, nested epoll structures. A local, unprivileged user could use this flaw to cause a denial of service. [2.6.39-200.29.2.el5uek] - epoll: clear the tfile_check_list on -ELOOP (Joe Jin) {CVE-2012-3375} - Don't limit non-nested epoll paths (Jason Baron) - epoll: kabi fixups for epoll limit wakeup paths (Joe Jin) {CVE-2011-1083} - epoll: limit paths (Jason Baron) {CVE-2011-1083} - cred: copy_process() should clear child->replacement_session_keyring (Oleg Nesterov) {CVE-2012-2745} _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata