ELSA-2011-0498

ELSA-2011-0498 - kernel security, bug fix, and enhancement update

Type:SECURITY
Impact:IMPORTANT
Release Date:2011-05-10

Description



[2.6.32-71.29.1.el6]
- [mm] Revert '[mm] pdpte registers are not flushed when PGD entry is changed in x86 PAE mode' (Larry Woodman) [695256 691310]

[2.6.32-71.28.1.el6]
- [net] bonding: fix jiffy comparison issues (Andy Gospodarek) [698109 696337]
- [drm] radeon/kms: check AA resolve registers on r300 + regression fix (Dave Airlie) [680001 680002] {CVE-2011-1016}
- [infiniband] uverbs: Handle large number of entries in poll CQ (Eugene Teo) [688429 696137] {CVE-2011-1044 CVE-2010-4649}
- [net] sctp: fix the INIT/INIT-ACK chunk length calculation (Thomas Graf) [695386 690743] {CVE-2011-1573}
- [net] CAN: Use inode instead of kernel address for /proc file (Danny Feng) [664560 664561] {CVE-2010-4565}
- [fs] inotify: fix double free/corruption of stuct user (Eric Paris) [656831 656832] {CVE-2010-4250}
- [net] netfilter: ipt_CLUSTERIP: fix buffer overflow (Jiri Pirko) [689341 689342]
- [net] bonding: change test for presence of VLANs (Jiri Pirko) [696487 683496]
- [scsi] scsi_dh: fix reference counting in scsi_dh_activate error path (Mike Snitzer) [696889 680140]
- [net] enable VLAN NULL tagging (Neil Horman) [683810 633571]
- [scsi] scsi_dh: propagate SCSI device deletion (Mike Snitzer) [698114 669411]
- [fs] inotify: stop kernel memory leak on file creation failure (Eric Paris) [656831 656832] {CVE-2010-4250}

[2.6.32-71.27.1.el6]
- [scsi] megaraid: give FW more time to recover from reset (Tomas Henzl) [695322 692673]
- [netdrv] ixgbe: fix for 82599 erratum on Header Splitting (Andy Gospodarek) [683820 669231]
- [sound] ALSA: hda - nvhdmi: Add missing codec IDs, unify names (Jaroslav Kysela) [683817 636922]
- [mm] pdpte registers are not flushed when PGD entry is changed in x86 PAE mode (Larry Woodman) [695256 691310]
- [net] fix ebtables stack infoleak (Eugene Teo) [681322 681323] {CVE-2011-1080}
- [drm] fix unsigned vs signed comparison issue in modeset ctl ioctl (Don Howard) [679927 679928] {CVE-2011-1013}
- [pci] Enable ASPM state clearing regardless of policy (Alex Williamson) [694073 681017]
- [pci] Disable ASPM if BIOS asks us to (Alex Williamson) [694073 681017]
- [mm] do not keep kswapd awake for an unreclaimable zone (Johannes Weiner) [694186 633825]

[2.6.32-71.26.1.el6]
- [net] bnep: fix buffer overflow (Don Howard) [681315 681316] {CVE-2011-1079}
- [scsi] aic94xx: world-writable sysfs update_bios file (Don Howard) [679306 679307]
- [x86] tc1100-wmi: world-writable sysfs wireless and jogdial files (Don Howard) [679306 679307]
- [x86] acer-wmi: world-writable sysfs threeg file (Don Howard) [679306 679307]
- [mfd] ab3100: world-writable debugfs *_priv files (Don Howard) [679306 679307]
- [v4l] sn9c102: world-wirtable sysfs files (Don Howard) [679306 679307]
- [x86] Fix EFI pagetable to map whole memory (Takao Indoh) [670850 664364]
- [kernel] CAP_SYS_MODULE bypass via CAP_NET_ADMIN (Phillip Lougher) [681772 681773] {CVE-2011-1019}
- [kernel] failure to revert address limit override in OOPS error path (Dave Anderson) [659572 659573] {CVE-2010-4258}
- [fs] xfs: zero proper structure size for geometry calls (Phillip Lougher) [677267 677268] {CVE-2011-0711}
- [fs] xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 (Phillip Lougher) [677267 677268] {CVE-2011-0711}
- [tty] tty_audit: fix tty_audit_add_data live lock on audit disabled (Danny Feng) [684275 680126]
- [kernel] proc: protect mm start_code/end_code in /proc/pid/stat (Eugene Teo) [684572 684573] {CVE-2011-0726}
- [net] dccp oops (Eugene Teo) [682957 682958] {CVE-2011-1093}
- [firmware] dcdbas: force SMI to happen when expected (Shyam Iyer) [683440 664832]
- [security] ima: fix add LSM rule bug (Eric Paris) [667914 667915] {CVE-2011-0006}
- [sound] caiaq: Fix possible string buffer overflow (Jaroslav Kysela) [678475 678476] {CVE-2011-0712}
- [net] ixgbe: add option to control interrupt mode (Andy Gospodarek) [670114 670110 622640 637332]

[2.6.32-71.25.1.el6]
- [net] bridge: do not learn from exact matches (Jiri Pirko) [691777 623199]


Related CVEs


CVE-2010-4649
CVE-2011-0712
CVE-2011-0726
CVE-2011-1080
CVE-2011-1016
CVE-2011-1573
CVE-2011-0006
CVE-2011-0711
CVE-2011-1093
CVE-2011-1013
CVE-2010-4250
CVE-2010-4565
CVE-2011-1019
CVE-2011-1044
CVE-2011-1079

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-71.29.1.el6.src.rpm47eb5aff1d445f50562058cc982566c6713cda088d64a25b7fcb333db15bdd65ELSA-2024-1831ol6_ga_i386_patch
kernel-2.6.32-71.29.1.el6.src.rpm47eb5aff1d445f50562058cc982566c6713cda088d64a25b7fcb333db15bdd65ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-71.29.1.el6.i686.rpm3e20df5fd680b9f105f24e4fc89860e5fdd8bc2dd5b187336ede273a8b89f8f6ELSA-2024-1831ol6_ga_i386_patch
kernel-2.6.32-71.29.1.el6.i686.rpm3e20df5fd680b9f105f24e4fc89860e5fdd8bc2dd5b187336ede273a8b89f8f6ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-71.29.1.el6.i686.rpm8c21eea03d2f139ac2ee4f791d5cfd93b96d6d21cae029126adc047cb5cfa60fELSA-2024-1831ol6_ga_i386_patch
kernel-debug-2.6.32-71.29.1.el6.i686.rpm8c21eea03d2f139ac2ee4f791d5cfd93b96d6d21cae029126adc047cb5cfa60fELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-71.29.1.el6.i686.rpm40c04836dc3c5165b7f11c6986e5853ecc4892ecf9ea1bfe150f044808637bbaELSA-2024-1831ol6_ga_i386_patch
kernel-debug-devel-2.6.32-71.29.1.el6.i686.rpm40c04836dc3c5165b7f11c6986e5853ecc4892ecf9ea1bfe150f044808637bbaELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-71.29.1.el6.i686.rpm6c8b34e2f787810c7c050cfa379213d719e42758c76b52269c51632e8433eb63ELSA-2024-1831ol6_ga_i386_patch
kernel-devel-2.6.32-71.29.1.el6.i686.rpm6c8b34e2f787810c7c050cfa379213d719e42758c76b52269c51632e8433eb63ELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm46887d22df538d572281e3a2b6db5a2059baaf51780fff561eb513906eadc372ELSA-2024-1831ol6_ga_i386_patch
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm46887d22df538d572281e3a2b6db5a2059baaf51780fff561eb513906eadc372ELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpme27c0d232990f7356801e60161755e484909fdf2780843c0d9a2f948ec987a65ELSA-2024-1831ol6_ga_i386_patch
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpme27c0d232990f7356801e60161755e484909fdf2780843c0d9a2f948ec987a65ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-71.29.1.el6.i686.rpm27ca906d34e3dff96613802a28a780eb56e45e1d0bb16ef779e58257578cbcecELSA-2024-1831ol6_ga_i386_patch
kernel-headers-2.6.32-71.29.1.el6.i686.rpm27ca906d34e3dff96613802a28a780eb56e45e1d0bb16ef779e58257578cbcecELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-71.29.1.el6.noarch.rpm394172a66990d6cc9e67e02691d95add66f370c8fe6f86b20db9af408cb1312fELSA-2024-1831ol6_ga_i386_patch
perf-2.6.32-71.29.1.el6.noarch.rpm394172a66990d6cc9e67e02691d95add66f370c8fe6f86b20db9af408cb1312fELSA-2024-1831ol6_i386_latest_archive
Oracle Linux 6 (x86_64) kernel-2.6.32-71.29.1.el6.src.rpm47eb5aff1d445f50562058cc982566c6713cda088d64a25b7fcb333db15bdd65ELSA-2024-1831ol6_ga_x86_64_patch
kernel-2.6.32-71.29.1.el6.src.rpm47eb5aff1d445f50562058cc982566c6713cda088d64a25b7fcb333db15bdd65ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-71.29.1.el6.x86_64.rpm4907d44fab34b7fd39350c5ce399460d7176326d13cdffd13f5d1e415f3e59adELSA-2024-1831ol6_ga_x86_64_patch
kernel-2.6.32-71.29.1.el6.x86_64.rpm4907d44fab34b7fd39350c5ce399460d7176326d13cdffd13f5d1e415f3e59adELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-71.29.1.el6.x86_64.rpm4d6a8ca0742604c65134f2203eb2f6c2b87b02b6d697a9cae6935aae42dd8314ELSA-2024-1831ol6_ga_x86_64_patch
kernel-debug-2.6.32-71.29.1.el6.x86_64.rpm4d6a8ca0742604c65134f2203eb2f6c2b87b02b6d697a9cae6935aae42dd8314ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-71.29.1.el6.x86_64.rpmaf5f9693faa9b30b93cbf4afc6839d471f000a1e9d174ebf6a694d9df349f404ELSA-2024-1831ol6_ga_x86_64_patch
kernel-debug-devel-2.6.32-71.29.1.el6.x86_64.rpmaf5f9693faa9b30b93cbf4afc6839d471f000a1e9d174ebf6a694d9df349f404ELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-71.29.1.el6.x86_64.rpm2fd50507c4666be816a9ad7daa96fc5f1fbcbce754f3918c63f9ba788a186a8cELSA-2024-1831ol6_ga_x86_64_patch
kernel-devel-2.6.32-71.29.1.el6.x86_64.rpm2fd50507c4666be816a9ad7daa96fc5f1fbcbce754f3918c63f9ba788a186a8cELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm46887d22df538d572281e3a2b6db5a2059baaf51780fff561eb513906eadc372ELSA-2024-1831ol6_ga_x86_64_patch
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm46887d22df538d572281e3a2b6db5a2059baaf51780fff561eb513906eadc372ELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpme27c0d232990f7356801e60161755e484909fdf2780843c0d9a2f948ec987a65ELSA-2024-1831ol6_ga_x86_64_patch
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpme27c0d232990f7356801e60161755e484909fdf2780843c0d9a2f948ec987a65ELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-71.29.1.el6.x86_64.rpm08dee11194b0f9ad0057f82aac830eef2d82e3d1c5358139cfcae34d19b9c093ELSA-2024-1831ol6_ga_x86_64_patch
kernel-headers-2.6.32-71.29.1.el6.x86_64.rpm08dee11194b0f9ad0057f82aac830eef2d82e3d1c5358139cfcae34d19b9c093ELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-71.29.1.el6.noarch.rpm394172a66990d6cc9e67e02691d95add66f370c8fe6f86b20db9af408cb1312fELSA-2024-1831ol6_ga_x86_64_patch
perf-2.6.32-71.29.1.el6.noarch.rpm394172a66990d6cc9e67e02691d95add66f370c8fe6f86b20db9af408cb1312fELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete