Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2011-04-07 |
[2.6.32-71.24.1.el6]
- [fs] Revert '[fs] inotify: stop kernel memory leak on file creation failure' (Eric Paris) [656831 656832] {CVE-2010-4250}
[2.6.32-71.23.1.el6]
- [x86] Revert '[x86] mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs' (Frank Arnold) [683813 652208]
[2.6.32-71.22.1.el6]
- rebuild
[2.6.32-71.21.1.el6]
- [netdrv] ixgbe: limit VF access to network traffic (Frantisek Hrbata) [684129 678717]
- [netdrv] ixgbe: work around for DDP last buffer size (Frantisek Hrbata) [684129 678717]
- [net] gro: reset dev and skb_iff on skb reuse (Andy Gospodarek) [688311 681970]
- [x86] mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs (Frank Arnold) [683813 652208]
- [virt] virtio_net: Add schedule check to napi_enable call (Michael S. Tsirkin) [684268 676579]
- [s390x] mm: add devmem_is_allowed() for STRICT_DEVMEM checking (Hendrik Brueckner) [684267 647365]
- [powerpc] Don't use kernel stack with translation off (Steve Best) [684266 628951]
- [powerpc] Initialise paca->kstack before early_setup_secondary (Steve Best) [684266 628951]
[2.6.32-71.20.1.el6]
- [dvb] kernel: av7110 negative array offset (Mauro Carvalho Chehab) [672403 672404] {CVE-2011-0521}
- [fs] sunrpc: Correct a misapplied patch (J. Bruce Fields) [678094 678146] {CVE-2011-0714}
- [netdrv] orinoco: fix TKIP countermeasure behaviour (Stanislaw Gruszka) [667908 667909] {CVE-2010-4648}
- [kernel] /proc/vmcore: speed up access to vmcore file (Neil Horman) [683442 672937]
- [netdrv] cnic: Fix big endian bug (Steve Best) [678484 676640]
- [scsi] fcoe: drop FCoE LOGO in FIP mode (Mike Christie) [683814 668114]
- [s390x] remove task_show_regs (Danny Feng) [677854 677855] {CVE-2011-0710}
- [ib] cm: Bump reference count on cm_id before invoking callback (Doug Ledford) [676190 676191] {CVE-2011-0695}
- [rdma] cm: Fix crash in request handlers (Doug Ledford) [676190 676191] {CVE-2011-0695}
- [net] bridge: Fix mglist corruption that leads to memory corruption (Herbert Xu) [678172 659421] {CVE-2011-0716}
- [netdrv] r8169: use RxFIFO overflow workaround and prevent RxFIFO induced infinite loops (Ivan Vecera) [680080 630810]
- [s390x] kernel: nohz vs cpu hotplug system hang (Hendrik Brueckner) [683815 668470]
- [netdrv] cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory (Doug Ledford) [633156 633157] {CVE-2010-3296}
- [configs] redhat: added CONFIG_SECURITY_DMESG_RESTRICT option (Frantisek Hrbata) [683822 653245]
- [kernel] restrict unprivileged access to kernel syslog (Frantisek Hrbata) [683822 653245]
- [fs] cifs: allow matching of tcp sessions in CifsNew state (Jeff Layton) [683812 629085]
- [fs] cifs: fix potential double put of TCP session reference (Jeff Layton) [683812 629085]
- [fs] cifs: prevent possible memory corruption in cifs_demultiplex_thread (Jeff Layton) [683812 629085]
- [fs] cifs: eliminate some more premature cifsd exits (Jeff Layton) [683812 629085]
- [fs] cifs: prevent cifsd from exiting prematurely (Jeff Layton) [683812 629085]
- [fs] CIFS: Make cifs_convert_address() take a const src pointer and a length (Jeff Layton) [683812 629085]
- [kdump] kexec: accelerate vmcore copies by marking oldmem in /proc/vmcore as cached (Neil Horman) [683445 641315]
- [virt] KVM: VMX: Disallow NMI while blocked by STI (Avi Kivity) [683783 616296]
- [virt] kvm: write protect memory after slot swap (Michael S. Tsirkin) [683781 647367]
[2.6.32-71.19.1.el6]
- [crypto] sha-s390: Reset index after processing partial block (Herbert Xu) [678996 626515]
- [net] clear heap allocations for privileged ethtool actions (Jiri Pirko) [672434 672435] {CVE-2010-4655}
- [usb] iowarrior: don't trust report_size for buffer size (Don Zickus) [672421 672422] {CVE-2010-4656}
- [virt] virtio: console: Wake up outvq on host notifications (Amit Shah) [678558 643750]
- [fs] inotify: stop kernel memory leak on file creation failure (Eric Paris) [656831 656832] {CVE-2010-4250}
- [net] sctp: fix kernel panic resulting from mishandling of icmp dest unreachable msg (Neil Horman) [667028 667029] {CVE-2010-4526}
- [mm] install_special_mapping skips security_file_mmap check (Frantisek Hrbata) [662198 662199] {CVE-2010-4346}
- [kdump] vt-d: Handle previous faults after enabling fault handling (Takao Indoh) [678485 617137]
- [kdump] Enable the intr-remap fault handling after local apic setup (Takao Indoh) [678485 617137]
- [kdump] vt-d: Fix the vt-d fault handling irq migration in the x2apic mode (Takao Indoh) [678485 617137]
- [kdump] vt-d: Quirk for masking vtd spec errors to platform error handling logic (Takao Indoh) [678485 617137]
- [virt] virtio: console: Don't block entire guest if host doesn't read data (Amit Shah) [678562 643751]
- [virt] virtio: console: Prevent userspace from submitting NULL buffers (Amit Shah) [678559 635535]
- [virt] virtio: console: Fix poll blocking even though there is data to read (Amit Shah) [678561 634232]
CVE-2010-3296 |
CVE-2010-4346 |
CVE-2010-4526 |
CVE-2010-4648 |
CVE-2010-4655 |
CVE-2010-4656 |
CVE-2011-0521 |
CVE-2011-0695 |
CVE-2011-0710 |
CVE-2011-0716 |
CVE-2011-1478 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (i386) | kernel-2.6.32-71.24.1.el6.src.rpm | d7e7a55da2858939faa4eb5838280be2 | ELSA-2021-9212 |
kernel-2.6.32-71.24.1.el6.i686.rpm | 8aa782e8d96d8ff78d89e5a3df2ef6dd | ELSA-2021-9212 | |
kernel-debug-2.6.32-71.24.1.el6.i686.rpm | 872f2d7f668094ad000eb54e8fea9afb | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm | 0486cbc63ed50861924640f340a7178d | ELSA-2021-9212 | |
kernel-devel-2.6.32-71.24.1.el6.i686.rpm | 1e0180e49dfbf444a46d3893a04965e1 | ELSA-2021-9212 | |
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm | 06290858e986a3bb432f6446d680c6d8 | ELSA-2021-9212 | |
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm | ffe476d62af79cc6a9129cfafdb7811a | ELSA-2021-9212 | |
kernel-headers-2.6.32-71.24.1.el6.i686.rpm | 929e8faecd83caa6b5dc70e08b31b9e8 | ELSA-2021-9212 | |
perf-2.6.32-71.24.1.el6.noarch.rpm | e33936d044eab26ad14e1858d3e1d1ad | ELSA-2021-9212 | |
Oracle Linux 6 (x86_64) | kernel-2.6.32-71.24.1.el6.src.rpm | d7e7a55da2858939faa4eb5838280be2 | ELSA-2021-9212 |
kernel-2.6.32-71.24.1.el6.x86_64.rpm | 3e6d88a49e44ffe5cadb722b6ab0c1a7 | ELSA-2021-9212 | |
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm | 184ae6d28e4c59893d06dccb53694a6f | ELSA-2021-9212 | |
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm | acbf8b6a0a6e6c83f29cbb9e6ad92c1d | ELSA-2021-9212 | |
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm | bcd15b893a67a96363754a1b4e4d3bfc | ELSA-2021-9212 | |
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm | 06290858e986a3bb432f6446d680c6d8 | ELSA-2021-9212 | |
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm | ffe476d62af79cc6a9129cfafdb7811a | ELSA-2021-9212 | |
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm | f6480fda3774c1eeba7c2b6a43c69956 | ELSA-2021-9212 | |
perf-2.6.32-71.24.1.el6.noarch.rpm | e33936d044eab26ad14e1858d3e1d1ad | ELSA-2021-9212 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team