Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Errata Announcements for Oracle Linux <el-errata <at> oss.oracle.com>
Subject: ELSA-2013-2504 Moderate: Oracle Linux 5 Unbreakable Enterprise kernel security update
Newsgroups: gmane.linux.oracle.el-errata
Date: Thursday 7th February 2013 19:23:42 UTC (over 3 years ago)
Oracle Linux Security Advisory ELSA-2013-2504

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-300.39.4.el5uek.i686.rpm
kernel-uek-debug-2.6.32-300.39.4.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.39.4.el5uek.i686.rpm
kernel-uek-headers-2.6.32-300.39.4.el5uek.i686.rpm
kernel-uek-devel-2.6.32-300.39.4.el5uek.i686.rpm
kernel-uek-doc-2.6.32-300.39.4.el5uek.noarch.rpm
kernel-uek-firmware-2.6.32-300.39.4.el5uek.noarch.rpm
ofa-2.6.32-300.39.4.el5uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-300.39.4.el5uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-300.39.4.el5uek-1.5.7-2.i686.rpm
mlnx_en-2.6.32-300.39.4.el5uekdebug-1.5.7-2.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-300.39.4.el5uek.noarch.rpm
kernel-uek-doc-2.6.32-300.39.4.el5uek.noarch.rpm
kernel-uek-2.6.32-300.39.4.el5uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.39.4.el5uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.39.4.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.39.4.el5uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.39.4.el5uek.x86_64.rpm
ofa-2.6.32-300.39.4.el5uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-300.39.4.el5uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-300.39.4.el5uek-1.5.7-2.x86_64.rpm
mlnx_en-2.6.32-300.39.4.el5uekdebug-1.5.7-2.x86_64.rpm



SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-300.39.4.el5uek.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-300.39.4.el5uek-1.5.1-4.0.58.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/mlnx_en-2.6.32-300.39.4.el5uek-1.5.7-2.src.rpm



Description of changes:

[2.6.32-300.39.4.el5uek]
- exec: do not leave bprm->interp on stack (Kees Cook) [Orabug: 16286741]
   {CVE-2012-4530}
- exec: use -ELOOP for max recursion depth (Kees Cook) [Orabug: 16286741]
   {CVE-2012-4530}

[2.6.32-300.39.3.el5uek]
- Xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS
guests.
   (Frediano Ziglio) [Orabug: 16274192] {CVE-2013-0190}
 
CD: 2ms