Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2010-10-22 |
Following security bugs are fixed in this errata
CVE-2010-3904
When copying data to userspace, the RDS protocol failed to verify that the user-provided address was a valid
userspace address. A local unprivileged user could issue specially crafted socket calls to write arbitrary
values into kernel memory and potentially escalate privileges to root.
CVE-2010-3067
Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows
local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit
system call.
CVE-2010-3477
The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing
functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which
allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump
operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
kernel:
[2.6.32-100.21.1.el5]
- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}
- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch
- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch
- [aio] linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch
ofa:
[1.5.1-4.0.23]
- Fix rds permissions checks during copies
[1.5.1-4.0.21]
- Update to BXOFED 1.5.1-1.3.6-5
CVE-2010-3904 |
CVE-2010-3067 |
CVE-2010-3477 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 5 (x86_64) | kernel-2.6.32-100.21.1.el5.x86_64.rpm | cec8870061a50ddbb9fd20571dc6033bba0089de3110112c4f828033677514ff | ELSA-2010-2011 | ol5_u5_x86_64_patch |
kernel-debug-2.6.32-100.21.1.el5.x86_64.rpm | a3d4aaa580d367c423518b61201b66c1354194b6050bb0570ec664d21813a6e3 | ELSA-2010-2011 | ol5_u5_x86_64_patch | |
kernel-debug-devel-2.6.32-100.21.1.el5.x86_64.rpm | a057a9b109a662ce0ca293c7628d8724dd5e938e3bc01bd0714386891f02ef9a | ELSA-2010-2011 | ol5_u5_x86_64_patch | |
kernel-devel-2.6.32-100.21.1.el5.x86_64.rpm | ed9e50f08a3f8b0c84555c4cf2ed0efd1cd9501024b90faa4a1c4cdd4b8051c5 | ELSA-2010-2011 | ol5_u5_x86_64_patch | |
kernel-doc-2.6.32-100.21.1.el5.noarch.rpm | dcf3aab9513ddef309173ea958423f2fded8470bf9391f25b1235c83c7b828ff | ELSA-2010-2011 | ol5_u5_x86_64_patch | |
kernel-firmware-2.6.32-100.21.1.el5.x86_64.rpm | e5290fc41ca55488fe71a81211fa13ce5901a973abfa8112eb3b468f6db2d5d3 | ELSA-2010-2011 | ol5_u5_x86_64_patch | |
kernel-headers-2.6.32-100.21.1.el5.x86_64.rpm | d7eb68d743f381df3ad24a8a181a45d7fc1566911f7db36198caeb05f4031d28 | ELSA-2010-2011 | ol5_u5_x86_64_patch | |
ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.x86_64.rpm | da810aed9b50e6856332f61b1fcd1375e72c2901780f64dc0b110d7d3061c42f | - | ol5_u5_x86_64_patch |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team