Oracle Linux Security Advisory ELSA-2012-2043

The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network:

i386:
kernel-uek-2.6.39-300.17.2.el6uek.i686.rpm
kernel-uek-debug-2.6.39-300.17.2.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.39-300.17.2.el6uek.i686.rpm
kernel-uek-devel-2.6.39-300.17.2.el6uek.i686.rpm
kernel-uek-doc-2.6.39-300.17.2.el6uek.noarch.rpm
kernel-uek-firmware-2.6.39-300.17.2.el6uek.noarch.rpm

x86_64:
kernel-uek-firmware-2.6.39-300.17.2.el6uek.noarch.rpm
kernel-uek-doc-2.6.39-300.17.2.el6uek.noarch.rpm
kernel-uek-2.6.39-300.17.2.el6uek.x86_64.rpm
kernel-uek-devel-2.6.39-300.17.2.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.39-300.17.2.el6uek.x86_64.rpm
kernel-uek-debug-2.6.39-300.17.2.el6uek.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.39-300.17.2.el6uek.src.rpm

Description of changes:

[2.6.39-300.17.2.el6uek]
- hugepages: fix use after free bug in "quota" handling [Orabug: 15845276] {CVE-2012-2133}
- udf: Fortify loading of sparing table [Orabug: 15845302] {CVE-2012-3400}
- udf: Avoid run away loop when partition table length is corrupt [Orabug: 15845302] {CVE-2012-3400}
- mm: Hold a file reference in madvise_remove [Orabug: 15846025] {CVE-2012-3511}

Oracle6: ELSA-2012-2043: kernel Moderate Security Update

The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network:

Summary

[2.6.39-300.17.2.el6uek] - hugepages: fix use after free bug in "quota" handling [Orabug: 15845276] {CVE-2012-2133} - udf: Fortify loading of sparing table [Orabug: 15845302] {CVE-2012-3400} - udf: Avoid run away loop when partition table length is corrupt [Orabug: 15845302] {CVE-2012-3400} - mm: Hold a file reference in madvise_remove [Orabug: 15846025] {CVE-2012-3511}

SRPMs

https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.39-300.17.2.el6uek.src.rpm

x86_64

kernel-uek-firmware-2.6.39-300.17.2.el6uek.noarch.rpm kernel-uek-doc-2.6.39-300.17.2.el6uek.noarch.rpm kernel-uek-2.6.39-300.17.2.el6uek.x86_64.rpm kernel-uek-devel-2.6.39-300.17.2.el6uek.x86_64.rpm kernel-uek-debug-devel-2.6.39-300.17.2.el6uek.x86_64.rpm kernel-uek-debug-2.6.39-300.17.2.el6uek.x86_64.rpm

aarch64

i386

kernel-uek-2.6.39-300.17.2.el6uek.i686.rpm kernel-uek-debug-2.6.39-300.17.2.el6uek.i686.rpm kernel-uek-debug-devel-2.6.39-300.17.2.el6uek.i686.rpm kernel-uek-devel-2.6.39-300.17.2.el6uek.i686.rpm kernel-uek-doc-2.6.39-300.17.2.el6uek.noarch.rpm kernel-uek-firmware-2.6.39-300.17.2.el6uek.noarch.rpm

Severity

Related News