ELSA-2012-0743

ELSA-2012-0743 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2012-06-18

Description


[2.6.32-220.23.1.el6]
- [net] bond: Make LRO flag follow slave settings (Neil Horman) [831176 794647]

[2.6.32-220.22.1.el6]
- [net] ipv4/netfilter: TCP and raw fix for ip_route_me_harder (Jiri Benc) [824429 812108]

[2.6.32-220.21.1.el6]
- [security] fix compile error in commoncap.c (Eric Paris) [806725 806726] {CVE-2012-2123}
- [security] fcaps: clear the same personality flags as suid when fcaps are used (Eric Paris) [806725 806726] {CVE-2012-2123}
- [net] rds: fix rds-ping inducing kernel panic (Jay Fenlason) [822757 803936] {CVE-2012-2372}
- [net] sock: validate data_len before allocating skb in sock_alloc_send_pskb() (Jason Wang) [816292 814504] {CVE-2012-2136}
- [virt] kvm: Fix buffer overflow in kvm_set_irq() (Avi Kivity) [816154 816155] {CVE-2012-2137}
- [drm] integer overflow in drm_mode_dirtyfb_ioctl() (Dave Airlie) [773249 773250] {CVE-2012-0044}
- [net] netfilter: Fix ip_route_me_harder triggering ip_rt_bug (Jiri Benc) [824429 812108]
- [net] netfilter/tproxy: do not assign timewait sockets to skb->sk (Jiri Benc) [824429 812108]
- [virt] xenpv: avoid paravirt __pmd in read_pmd_atomic (Andrew Jones) [823903 822697]
- [infiniband] mlx4: fix RoCE oops (Doug Ledford) [799946 749059]
- [mm] read_pmd_atomic: fix pmd_populate SMP race condition (Andrea Arcangeli) [822824 820762] {CVE-2012-2373}
- [infiniband] mlx4: check return code and bail on error (Doug Ledford) [799946 749059]
- [infiniband] mlx4: use locking when walking netdev list (Doug Ledford) [799946 749059]
- [mm] thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode (Andrea Arcangeli) [803808 800328] {CVE-2012-1179}

[2.6.32-220.20.1.el6]
- [vhost] net: fix possible NULL pointer dereference of vq->bufs (Jason Wang) [814286 814288] {CVE-2012-2119}
- [net] macvtap: validate zerocopy vectors before building skb (Jason Wang) [814286 814288] {CVE-2012-2119}
- [net] macvtap: set SKBTX_DEV_ZEROCOPY only when skb is built successfully (Jason Wang) [814286 814288] {CVE-2012-2119}
- [net] macvtap: put zerocopy page when fail to get all requested user pages (Jason Wang) [814286 814288] {CVE-2012-2119}
- [net] macvtap: fix zerocopy offset calculation when building skb (Jason Wang) [814286 814288] {CVE-2012-2119}
- [net] bonding: remove entries for master_ip and vlan_ip and query devices instead (Andy Gospodarek) [816197 810299]
- [virt] KVM: lock slots_lock around device assignment (Alex Williamson) [814154 811653] {CVE-2012-2121}
- [virt] kvm: unmap pages from the iommu when slots are removed (Alex Williamson) [814154 811653] {CVE-2012-2121}
- [virt] xenfv: fix hangs when kdumping (Andrew Jones) [812953 811815]
- [s390x] zcrypt: Fix parameter checking for ZSECSENDCPRB ioctl (Hendrik Brueckner) [810125 808487]
- [drm] i915: suspend fbdev device around suspend/hibernate (Dave Airlie) [818503 746169]
- [fs] tmpfs: fix off-by-one in max_blocks checks (Eric Sandeen) [809399 783497]
- [net] bonding: Allow Bonding driver to disable/enable LRO on slaves (Neil Horman) [818504 772317]
- [virt] xen-blkfront: conditionally drop name and minor adjustments for emulated scsi devs (Laszlo Ersek) [818505 729586]
- [virt] xen-blk: plug device number leak on error path in xlblk_init (Laszlo Ersek) [818505 729586]

[2.6.32-220.19.1.el6]
- [pci] Fix unbootable HP DL385G6 on 2.6.32-220 by properly disabling pcie aspm (Dave Wysochanski) [819614 769626]

[2.6.32-220.18.1.el6]
- [netdrv] iwlwifi: add option to disable 5Ghz band (Stanislaw Gruszka) [816226 812259]
- [netdrv] iwlwifi: cancel scan before nulify ctx->vif (Stanislaw Gruszka) [816225 801730]
- [netdrv] iwlwifi: do not nulify ctx->vif on reset (Stanislaw Gruszka) [816225 801730]
- [net] mac80211: workaround crash at ieee80211_mgd_probe_ap_send (Stanislaw Gruszka) [814657 808095]
- [net] bonding: 802.3ad - fix agg_device_up (Veaceslav Falico) [817466 806081]
- [scsi] st: fix memory leak with 1MB tape I/O (David Milburn) [816271 811703]


Related CVEs


CVE-2012-2121
CVE-2012-1179
CVE-2012-2137
CVE-2012-2119
CVE-2012-0044
CVE-2012-2136
CVE-2012-2123
CVE-2012-2372
CVE-2012-2373

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-220.23.1.el6.src.rpm4ac2079f992c05183b27eb8f9d1bc35fc207793ab28a1cece04566e4a68e0137ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-220.23.1.el6.src.rpm4ac2079f992c05183b27eb8f9d1bc35fc207793ab28a1cece04566e4a68e0137ELSA-2024-1831ol6_u2_i386_patch
kernel-2.6.32-220.23.1.el6.i686.rpmf5c59facde86ed407f6557b2fc22e053f73285f8cea1026e902a3751a27fbc14ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-220.23.1.el6.i686.rpmf5c59facde86ed407f6557b2fc22e053f73285f8cea1026e902a3751a27fbc14ELSA-2024-1831ol6_u2_i386_patch
kernel-debug-2.6.32-220.23.1.el6.i686.rpme7ff2cc818ebb178809251cfd3a05b59ab75f56f1e57a10595b1267a48f42eb3ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-220.23.1.el6.i686.rpme7ff2cc818ebb178809251cfd3a05b59ab75f56f1e57a10595b1267a48f42eb3ELSA-2024-1831ol6_u2_i386_patch
kernel-debug-devel-2.6.32-220.23.1.el6.i686.rpm9f4bb324b82679aa7d9fce47082c529e4dda90793a3eeb1b9afd6b9a4209518aELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-220.23.1.el6.i686.rpm9f4bb324b82679aa7d9fce47082c529e4dda90793a3eeb1b9afd6b9a4209518aELSA-2024-1831ol6_u2_i386_patch
kernel-devel-2.6.32-220.23.1.el6.i686.rpm20bb8ebc27d04fae936feae1cc2f7bc9ffcc1f6e2a1dc655e1c4296cf2bd41c3ELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-220.23.1.el6.i686.rpm20bb8ebc27d04fae936feae1cc2f7bc9ffcc1f6e2a1dc655e1c4296cf2bd41c3ELSA-2024-1831ol6_u2_i386_patch
kernel-doc-2.6.32-220.23.1.el6.noarch.rpma9b76739d06926ffd5e8ba07ec14409e80cf4e3c432ebd451a78e501f1682da1ELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-220.23.1.el6.noarch.rpma9b76739d06926ffd5e8ba07ec14409e80cf4e3c432ebd451a78e501f1682da1ELSA-2024-1831ol6_u2_i386_patch
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm0dca98446344f5b092ce725a4f0ff666d170f77958d7af5f4478d4f39bf04f8aELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm0dca98446344f5b092ce725a4f0ff666d170f77958d7af5f4478d4f39bf04f8aELSA-2024-1831ol6_u2_i386_patch
kernel-headers-2.6.32-220.23.1.el6.i686.rpmb427982e4290eedcfbe2bd79af23c451343c4b232ede6df618a636eb8a9ba899ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-220.23.1.el6.i686.rpmb427982e4290eedcfbe2bd79af23c451343c4b232ede6df618a636eb8a9ba899ELSA-2024-1831ol6_u2_i386_patch
perf-2.6.32-220.23.1.el6.i686.rpmae6f1d312ea4f3dbeba68d33e4fb745589b233d11ff0ff5beac209e3d711b0beELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-220.23.1.el6.i686.rpmae6f1d312ea4f3dbeba68d33e4fb745589b233d11ff0ff5beac209e3d711b0beELSA-2024-1831ol6_u2_i386_patch
python-perf-2.6.32-220.23.1.el6.i686.rpm53795d599487af5a9f7a9ce11dc61125ce8c06e18016128cb8c7d79891ab4ee6ELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-220.23.1.el6.i686.rpm53795d599487af5a9f7a9ce11dc61125ce8c06e18016128cb8c7d79891ab4ee6ELSA-2024-1831ol6_u2_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-220.23.1.el6.src.rpm4ac2079f992c05183b27eb8f9d1bc35fc207793ab28a1cece04566e4a68e0137ELSA-2024-1831ol6_u2_x86_64_patch
kernel-2.6.32-220.23.1.el6.src.rpm4ac2079f992c05183b27eb8f9d1bc35fc207793ab28a1cece04566e4a68e0137ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-220.23.1.el6.x86_64.rpm8f0baed7157c934070d7c80cbfb510e49c927ab6aeeb509475aec72749fc069eELSA-2024-1831ol6_u2_x86_64_patch
kernel-2.6.32-220.23.1.el6.x86_64.rpm8f0baed7157c934070d7c80cbfb510e49c927ab6aeeb509475aec72749fc069eELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-220.23.1.el6.x86_64.rpmadd6d0585ce4224bf69e55d4fbbd16fb42421520bd2ad65ae0ba6ec8fd63424fELSA-2024-1831ol6_u2_x86_64_patch
kernel-debug-2.6.32-220.23.1.el6.x86_64.rpmadd6d0585ce4224bf69e55d4fbbd16fb42421520bd2ad65ae0ba6ec8fd63424fELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-220.23.1.el6.x86_64.rpm3ef58587dd2d9bea3e7e287bb4dcc1b35efb8d37b99239929d9f739ce26b1a16ELSA-2024-1831ol6_u2_x86_64_patch
kernel-debug-devel-2.6.32-220.23.1.el6.x86_64.rpm3ef58587dd2d9bea3e7e287bb4dcc1b35efb8d37b99239929d9f739ce26b1a16ELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-220.23.1.el6.x86_64.rpm8840e823f0d51b13618db121e6b2f2ce9cdb5da48c73857cb51ea433e647d14bELSA-2024-1831ol6_u2_x86_64_patch
kernel-devel-2.6.32-220.23.1.el6.x86_64.rpm8840e823f0d51b13618db121e6b2f2ce9cdb5da48c73857cb51ea433e647d14bELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-220.23.1.el6.noarch.rpma9b76739d06926ffd5e8ba07ec14409e80cf4e3c432ebd451a78e501f1682da1ELSA-2024-1831ol6_u2_x86_64_patch
kernel-doc-2.6.32-220.23.1.el6.noarch.rpma9b76739d06926ffd5e8ba07ec14409e80cf4e3c432ebd451a78e501f1682da1ELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm0dca98446344f5b092ce725a4f0ff666d170f77958d7af5f4478d4f39bf04f8aELSA-2024-1831ol6_u2_x86_64_patch
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm0dca98446344f5b092ce725a4f0ff666d170f77958d7af5f4478d4f39bf04f8aELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-220.23.1.el6.x86_64.rpmce126aeea900e535b0dd584f49c8ce567bf7c3ce9664576b789ef4d350639336ELSA-2024-1831ol6_u2_x86_64_patch
kernel-headers-2.6.32-220.23.1.el6.x86_64.rpmce126aeea900e535b0dd584f49c8ce567bf7c3ce9664576b789ef4d350639336ELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-220.23.1.el6.x86_64.rpm86280a9da6b5383eb704c647158682020998161d80b62019e59981988e378080ELSA-2024-1831ol6_u2_x86_64_patch
perf-2.6.32-220.23.1.el6.x86_64.rpm86280a9da6b5383eb704c647158682020998161d80b62019e59981988e378080ELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-220.23.1.el6.x86_64.rpm7c78617226e0bf97d2d30b58b33a9d35696e91ef70964d1095fceef861264943ELSA-2024-1831ol6_u2_x86_64_patch
python-perf-2.6.32-220.23.1.el6.x86_64.rpm7c78617226e0bf97d2d30b58b33a9d35696e91ef70964d1095fceef861264943ELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete