ELSA-2012-0350

ELSA-2012-0350 - kernel security and bug fix update

Type:SECURITY
Severity:MODERATE
Release Date:2012-03-06

Description


[2.6.32-220.7.1.el6]
- [netdrv] tg3: Fix single-vector MSI-X code (John Feeney) [787162 703555]
- [mm] export remove_from_page_cache() to modules (Jerome Marchand) [772687 751419]
- [block] cfq-iosched: fix cfq_cic_link() race confition (Vivek Goyal) [786022 765673]
- [fs] cifs: lower default wsize when unix extensions are not used (Jeff Layton) [789058 773705]
- [net] svcrpc: fix double-free on shutdown of nfsd after changing pool mode (J. Bruce Fields) [787580 753030]
- [net] svcrpc: avoid memory-corruption on pool shutdown (J. Bruce Fields) [787580 753030]
- [net] svcrpc: destroy server sockets all at once (J. Bruce Fields) [787580 753030]
- [net] svcrpc: simplify svc_close_all (J. Bruce Fields) [787580 753030]
- [net] svcrpc: fix list-corrupting race on nfsd shutdown (J. Bruce Fields) [787580 753030]
- [fs] xfs: Fix missing xfs_iunlock() on error recovery path in xfs_readlink() (Carlos Maiolino) [749161 694702] {CVE-2011-4077}
- [fs] xfs: Fix memory corruption in xfs_readlink (Carlos Maiolino) [749161 694702] {CVE-2011-4077}
- [x86] hpet: Disable per-cpu hpet timer if ARAT is supported (Prarit Bhargava) [772884 750201]
- [x86] Improve TSC calibration using a delayed workqueue (Prarit Bhargava) [772884 750201]
- [kernel] clocksource: Add clocksource_register_hz/khz interface (Prarit Bhargava) [772884 750201]
- [kernel] clocksource: Provide a generic mult/shift factor calculation (Prarit Bhargava) [772884 750201]
- [block] cfq-iosched: fix a kbuild regression (Vivek Goyal) [769208 705698]
- [block] cfq-iosched: rethink seeky detection for SSDs (Vivek Goyal) [769208 705698]
- [block] cfq-iosched: rework seeky detection (Vivek Goyal) [769208 705698]
- [block] cfq-iosched: don't regard requests with long distance as close (Vivek Goyal) [769208 705698]

[2.6.32-220.6.1.el6]
- [scsi] qla2xxx: Module parameter to control use of async or sync port login (Chad Dupuis) [788003 769007]

[2.6.32-220.5.1.el6]
- [net] igmp: Avoid zero delay when receiving odd mixture of IGMP queries (Jiri Pirko) [772870 772871] {CVE-2012-0207}
- [fs] xfs: validate acl count (Eric Sandeen) [773282 773283] {CVE-2012-0038}
- [fs] Fix sendfile write-side file position (Steven Whitehouse) [771870 770023]
- [virt] kvm: x86: fix missing checks in syscall emulation (Marcelo Tosatti) [773390 773391] {CVE-2012-0045}
- [virt] kvm: x86: extend 'struct x86_emulate_ops' with 'get_cpuid' (Marcelo Tosatti) [773390 773391] {CVE-2012-0045}
- [fs] nfs: when attempting to open a directory, fall back on normal lookup (Jeff Layton) [771981 755380]
- [kernel] crypto: ghash - Avoid null pointer dereference if no key is set (Jiri Benc) [749481 749482] {CVE-2011-4081}
- [fs] jbd2: validate sb->s_first in journal_get_superblock() (Eryu Guan) [753344 693981] {CVE-2011-4132}
- [net] fix unsafe pointer access in sendmmsg (Jiri Benc) [761668 760798] {CVE-2011-4594}
- [scsi] increase qla2xxx firmware ready time-out (Mark Goodwin) [781971 731917]
- [perf] powerpc: Handle events that raise an exception without overflowing (Steve Best) [767917 755737] {CVE-2011-4611}
- [sched] x86: Avoid unnecessary overflow in sched_clock (Prarit Bhargava) [781974 765720]
- [virt] x86: Prevent starting PIT timers in the absence of irqchip support (Marcelo Tosatti) [769634 769550] {CVE-2011-4622}
- [virt] vmxnet3: revert hw features change (Neil Horman) [761536 759613]
- [netdrv] qlge: fix size of external list for TX address descriptors (Steve Best) [783226 772237]
- [netdrv] e1000e: Avoid wrong check on TX hang (Dean Nelson) [768916 751087]
- [virt] KVM: Device assignment permission checks (Alex Williamson) [756092 756093] {CVE-2011-4347}
- [virt] KVM: Remove ability to assign a device without iommu support (Alex Williamson) [756092 756093] {CVE-2011-4347}
- [virt] kvm: device-assignment: revert Disable the option to skip iommu setup (Alex Williamson) [756092 756093] {CVE-2011-4347}


Related CVEs


CVE-2011-4081
CVE-2011-4347
CVE-2011-4594
CVE-2011-4611
CVE-2012-0038
CVE-2012-0045
CVE-2012-0207
CVE-2011-4077
CVE-2011-4132
CVE-2011-4622

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-220.7.1.el6.src.rpm1fa68c6aa8037e692bfbbc941ea47183ELSA-2021-9212
kernel-2.6.32-220.7.1.el6.i686.rpm5c96d658cf3f744a38cfd3e97c6dcabeELSA-2021-9212
kernel-debug-2.6.32-220.7.1.el6.i686.rpmc6ed295477153db95a3329490f1f1ff9ELSA-2021-9212
kernel-debug-devel-2.6.32-220.7.1.el6.i686.rpm16f9f34b4b497a7c28a66a97ff9a48e4ELSA-2021-9212
kernel-devel-2.6.32-220.7.1.el6.i686.rpm7ca2c1c6849de7dbb75071e64d524ef1ELSA-2021-9212
kernel-doc-2.6.32-220.7.1.el6.noarch.rpmc807c881718d891e5d5893ef90182929ELSA-2021-9212
kernel-firmware-2.6.32-220.7.1.el6.noarch.rpmea9d2f1e77fad030f77a094e98e7dbb4ELSA-2021-9212
kernel-headers-2.6.32-220.7.1.el6.i686.rpm9c3de591e8a0d22a78f437cf039c406cELSA-2021-9212
perf-2.6.32-220.7.1.el6.i686.rpmc600c4001bdd6420e23d58d022721847ELSA-2021-9212
python-perf-2.6.32-220.7.1.el6.i686.rpm09832d8e18067838cc829fb1f3cc9e24ELSA-2021-9212
Oracle Linux 6 (x86_64) kernel-2.6.32-220.7.1.el6.src.rpm1fa68c6aa8037e692bfbbc941ea47183ELSA-2021-9212
kernel-2.6.32-220.7.1.el6.x86_64.rpmc869e9875d5eaad7445cdd9d57cf08adELSA-2021-9212
kernel-debug-2.6.32-220.7.1.el6.x86_64.rpm5919e21f9029a70c9010e0c22a8b27efELSA-2021-9212
kernel-debug-devel-2.6.32-220.7.1.el6.x86_64.rpmd5fb87fbcfe4a36e1be232a3b89c990bELSA-2021-9212
kernel-devel-2.6.32-220.7.1.el6.x86_64.rpme6dd3d53e2d04bb7e505284ed94471e4ELSA-2021-9212
kernel-doc-2.6.32-220.7.1.el6.noarch.rpmc807c881718d891e5d5893ef90182929ELSA-2021-9212
kernel-firmware-2.6.32-220.7.1.el6.noarch.rpmea9d2f1e77fad030f77a094e98e7dbb4ELSA-2021-9212
kernel-headers-2.6.32-220.7.1.el6.x86_64.rpm1b33f9e2c91bca6adace582f94c07d95ELSA-2021-9212
perf-2.6.32-220.7.1.el6.x86_64.rpm8b56b3ea743d8860b3b5b10e3ecc7101ELSA-2021-9212
python-perf-2.6.32-220.7.1.el6.x86_64.rpm8db8a5525af5b7285893ac3f7700b2dcELSA-2021-9212



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete