ELSA-2010-2009

ELSA-2010-2009 - Oracle Linux 5 Unbreakable Enterprise kernel security fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2010-10-22

Description



Following security bugs are fixed in this errata

CVE-2010-3904
When copying data to userspace, the RDS protocol failed to verify that the user-provided address was a valid
userspace address. A local unprivileged user could issue specially crafted socket calls to write arbitrary
values into kernel memory and potentially escalate privileges to root.

CVE-2010-3067
Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows
local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit
system call.

CVE-2010-3477
The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing
functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which
allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump
operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.

kernel:

[2.6.32-100.21.1.el5]
- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}
- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch
- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch
- [aio] linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch

ofa:

[1.5.1-4.0.23]
- Fix rds permissions checks during copies

[1.5.1-4.0.21]
- Update to BXOFED 1.5.1-1.3.6-5


Related CVEs


CVE-2010-3904
CVE-2010-3067
CVE-2010-3477

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (x86_64)kernel-2.6.32-100.21.1.el5.x86_64.rpmcec8870061a50ddbb9fd20571dc6033bba0089de3110112c4f828033677514ffELSA-2010-2011ol5_u5_x86_64_patch
kernel-debug-2.6.32-100.21.1.el5.x86_64.rpma3d4aaa580d367c423518b61201b66c1354194b6050bb0570ec664d21813a6e3ELSA-2010-2011ol5_u5_x86_64_patch
kernel-debug-devel-2.6.32-100.21.1.el5.x86_64.rpma057a9b109a662ce0ca293c7628d8724dd5e938e3bc01bd0714386891f02ef9aELSA-2010-2011ol5_u5_x86_64_patch
kernel-devel-2.6.32-100.21.1.el5.x86_64.rpmed9e50f08a3f8b0c84555c4cf2ed0efd1cd9501024b90faa4a1c4cdd4b8051c5ELSA-2010-2011ol5_u5_x86_64_patch
kernel-doc-2.6.32-100.21.1.el5.noarch.rpmdcf3aab9513ddef309173ea958423f2fded8470bf9391f25b1235c83c7b828ffELSA-2010-2011ol5_u5_x86_64_patch
kernel-firmware-2.6.32-100.21.1.el5.x86_64.rpme5290fc41ca55488fe71a81211fa13ce5901a973abfa8112eb3b468f6db2d5d3ELSA-2010-2011ol5_u5_x86_64_patch
kernel-headers-2.6.32-100.21.1.el5.x86_64.rpmd7eb68d743f381df3ad24a8a181a45d7fc1566911f7db36198caeb05f4031d28ELSA-2010-2011ol5_u5_x86_64_patch
ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23.x86_64.rpmda810aed9b50e6856332f61b1fcd1375e72c2901780f64dc0b110d7d3061c42f-ol5_u5_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete