Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Errata Announcements for Oracle Linux <el-errata <at> oss.oracle.com>
Subject: ELSA-2013-2534 Moderate: Oracle Linux 5 Unbreakable Enterprise kernel security update
Newsgroups: gmane.linux.oracle.el-errata
Date: Wednesday 12th June 2013 20:20:12 UTC (over 3 years ago)
Oracle Linux Security Advisory ELSA-2013-2534

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-400.29.1.el5uek.i686.rpm
kernel-uek-debug-2.6.32-400.29.1.el5uek.i686.rpm
kernel-uek-debug-devel-2.6.32-400.29.1.el5uek.i686.rpm
kernel-uek-headers-2.6.32-400.29.1.el5uek.i686.rpm
kernel-uek-devel-2.6.32-400.29.1.el5uek.i686.rpm
kernel-uek-doc-2.6.32-400.29.1.el5uek.noarch.rpm
kernel-uek-firmware-2.6.32-400.29.1.el5uek.noarch.rpm
ofa-2.6.32-400.29.1.el5uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-400.29.1.el5uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-400.29.1.el5uek-1.5.7-2.i686.rpm
mlnx_en-2.6.32-400.29.1.el5uekdebug-1.5.7-2.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-400.29.1.el5uek.noarch.rpm
kernel-uek-doc-2.6.32-400.29.1.el5uek.noarch.rpm
kernel-uek-2.6.32-400.29.1.el5uek.x86_64.rpm
kernel-uek-headers-2.6.32-400.29.1.el5uek.x86_64.rpm
kernel-uek-devel-2.6.32-400.29.1.el5uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-400.29.1.el5uek.x86_64.rpm
kernel-uek-debug-2.6.32-400.29.1.el5uek.x86_64.rpm
ofa-2.6.32-400.29.1.el5uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-400.29.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-400.29.1.el5uek-1.5.7-2.x86_64.rpm
mlnx_en-2.6.32-400.29.1.el5uekdebug-1.5.7-2.x86_64.rpm



SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/kernel-uek-2.6.32-400.29.1.el5uek.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/ofa-2.6.32-400.29.1.el5uek-1.5.1-4.0.58.src.rpm
http://oss.oracle.com/ol5/SRPMS-updates/mlnx_en-2.6.32-400.29.1.el5uek-1.5.7-2.src.rpm



Description of changes:

[2.6.32-400.29.1.el5uek]
- KVM: add missing void __user COPYING CREDITS Documentation Kbuild 
MAINTAINERS Makefile README REPORTING-BUGS arch block crypto drivers 
firmware fs include init ipc kernel lib mm net samples scripts security 
sound tools uek-rpm usr virt cast to access_ok() call (Heiko Carstens) 
[Orabug: 16941620] {CVE-2013-1943}
- KVM: Validate userspace_addr of memslot when registered (Takuya 
Yoshikawa) [Orabug: 16941620] {CVE-2013-1943}

[2.6.32-400.28.1.el5uek]
- do_add_mount()/umount -l races (Jerry Snitselaar) [Orabug: 16311974]
- tg3: fix length overflow in VPD firmware parsing (Kees Cook) [Orabug: 
16837019] {CVE-2013-1929}
- USB: cdc-wdm: fix buffer overflow (Oliver Neukum) [Orabug: 16837003] 
{CVE-2013-1860}
- bonding: emit event when bonding changes MAC (Weiping Pan) [Orabug: 
16579025]
- sched: Fix ancient race in do_exit() (Joe Jin)
- open debug in page_move_anon_rmap by default. (Xiaowei.Hu) [Orabug: 
14046035]
- block: default SCSI command filter does not accomodate commands 
overlap across device classes (Jamie Iles) [Orabug: 16387136] 
{CVE-2012-4542}
- vma_adjust: fix the copying of anon_vma chains (Linus Torvalds) 
[Orabug: 14046035]
- xen-netfront: delay gARP until backend switches to Connected (Laszlo 
Ersek) [Orabug: 16182568]
- svcrpc: don't hold sv_lock over svc_xprt_put() (J. Bruce Fields) 
[Orabug: 16032824]
- mm/hotplug: correctly add new zone to all other nodes' zone lists 
(Jiang Liu) [Orabug: 16603569] {CVE-2012-5517}
- ptrace: ptrace_resume() shouldn't wake up !TASK_TRACED thread (Oleg 
Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL 
(Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up() 
(Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson 
Lizardo) [Orabug: 16711062] {CVE-2013-0349}
- dccp: check ccid before dereferencing (Mathias Krause) [Orabug: 
16711040] {CVE-2013-1827}
- USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch) 
[Orabug: 16425435] {CVE-2013-1774}
- keys: fix race with concurrent install_user_keyrings() (David Howells) 
[Orabug: 16493369] {CVE-2013-1792}
- KVM: Fix bounds checking in ioapic indirect register reads 
(CVE-2013-1798) (Andy Honig) [Orabug: 16710937] {CVE-2013-1798}
- KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME 
(CVE-2013-1796) (Jerry Snitselaar) [Orabug: 16710794] {CVE-2013-1796}

[2.6.32-400.27.1.el5uek]
- net/tun: fix ioctl() based info leaks (Mathias Krause) [Orabug: 
16675501] {CVE-2012-6547}
- atm: fix info leak via getsockname() (Mathias Krause) [Orabug: 
16675501] {CVE-2012-6546}
- atm: fix info leak in getsockopt(SO_ATMPVC) (Mathias Krause) [Orabug: 
16675501] {CVE-2012-6546}
- xfrm_user: fix info leak in copy_to_user_tmpl() (Mathias Krause) 
[Orabug: 16675501] {CVE-2012-6537}
- xfrm_user: fix info leak in copy_to_user_policy() (Mathias Krause) 
[Orabug: 16675501] {CVE-2012-6537}
- xfrm_user: fix info leak in copy_to_user_state() (Mathias Krause) 
[Orabug: 16675501] {CVE-2013-6537}
- xfrm_user: return error pointer instead of NULL #2 (Mathias Krause) 
[Orabug: 16675501] {CVE-2013-1826}
- xfrm_user: return error pointer instead of NULL (Mathias Krause) 
[Orabug: 16675501] {CVE-2013-1826}
- llc: fix info leak via getsockname() (Mathias Krause) [Orabug: 
16675501] {CVE-2012-6542}
- x86/mm: Check if PUD is large when validating a kernel address (Mel 
Gorman) [Orabug: 14251997]
 
CD: 3ms