Oracle Linux Security Advisory ELSA-2012-2044

The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-300.39.1.el6uek.i686.rpm
kernel-uek-debug-2.6.32-300.39.1.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.32-300.39.1.el6uek.i686.rpm
kernel-uek-headers-2.6.32-300.39.1.el6uek.i686.rpm
kernel-uek-devel-2.6.32-300.39.1.el6uek.i686.rpm
kernel-uek-doc-2.6.32-300.39.1.el6uek.noarch.rpm
kernel-uek-firmware-2.6.32-300.39.1.el6uek.noarch.rpm
ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-300.39.1.el6uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.i686.rpm
mlnx_en-2.6.32-300.39.1.el6uekdebug-1.5.7-0.1.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-300.39.1.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-300.39.1.el6uek.noarch.rpm
kernel-uek-2.6.32-300.39.1.el6uek.x86_64.rpm
kernel-uek-headers-2.6.32-300.39.1.el6uek.x86_64.rpm
kernel-uek-devel-2.6.32-300.39.1.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-300.39.1.el6uek.x86_64.rpm
kernel-uek-debug-2.6.32-300.39.1.el6uek.x86_64.rpm
ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-300.39.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.x86_64.rpm
mlnx_en-2.6.32-300.39.1.el6uekdebug-1.5.7-0.1.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.32-300.39.1.el6uek.src.rpm
https://oss.oracle.com:443/ol6/SRPMS-updates/ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.src.rpm
https://oss.oracle.com:443/ol6/SRPMS-updates/mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.src.rpm

Description of changes:

[2.6.32-300.39.1.el6uek]
- hugepages: fix use after free bug in "quota" handling [15842385] {CVE-2012-2133}
- mm: Hold a file reference in madvise_remove [15842884] {CVE-2012-3511}
- udf: Fortify loading of sparing table [15843730] {CVE-2012-3400}
- udf: Avoid run away loop when partition table length is corrupt [15843730] {CVE-2012-3400}

Oracle6: ELSA-2012-2044: kernel Moderate Security Update

The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network:

Summary

[2.6.32-300.39.1.el6uek] - hugepages: fix use after free bug in "quota" handling [15842385] {CVE-2012-2133} - mm: Hold a file reference in madvise_remove [15842884] {CVE-2012-3511} - udf: Fortify loading of sparing table [15843730] {CVE-2012-3400} - udf: Avoid run away loop when partition table length is corrupt [15843730] {CVE-2012-3400}

SRPMs

https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.32-300.39.1.el6uek.src.rpm https://oss.oracle.com:443/ol6/SRPMS-updates/ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.src.rpm https://oss.oracle.com:443/ol6/SRPMS-updates/mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.src.rpm

x86_64

kernel-uek-firmware-2.6.32-300.39.1.el6uek.noarch.rpm kernel-uek-doc-2.6.32-300.39.1.el6uek.noarch.rpm kernel-uek-2.6.32-300.39.1.el6uek.x86_64.rpm kernel-uek-headers-2.6.32-300.39.1.el6uek.x86_64.rpm kernel-uek-devel-2.6.32-300.39.1.el6uek.x86_64.rpm kernel-uek-debug-devel-2.6.32-300.39.1.el6uek.x86_64.rpm kernel-uek-debug-2.6.32-300.39.1.el6uek.x86_64.rpm ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.x86_64.rpm ofa-2.6.32-300.39.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.x86_64.rpm mlnx_en-2.6.32-300.39.1.el6uekdebug-1.5.7-0.1.x86_64.rpm

aarch64

i386

kernel-uek-2.6.32-300.39.1.el6uek.i686.rpm kernel-uek-debug-2.6.32-300.39.1.el6uek.i686.rpm kernel-uek-debug-devel-2.6.32-300.39.1.el6uek.i686.rpm kernel-uek-headers-2.6.32-300.39.1.el6uek.i686.rpm kernel-uek-devel-2.6.32-300.39.1.el6uek.i686.rpm kernel-uek-doc-2.6.32-300.39.1.el6uek.noarch.rpm kernel-uek-firmware-2.6.32-300.39.1.el6uek.noarch.rpm ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.i686.rpm ofa-2.6.32-300.39.1.el6uekdebug-1.5.1-4.0.58.i686.rpm mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.i686.rpm mlnx_en-2.6.32-300.39.1.el6uekdebug-1.5.7-0.1.i686.rpm

Severity

Related News