ELSA-2012-1580

ELSA-2012-1580 - kernel security, bug fix and enhancement update

Type:SECURITY
Impact:MODERATE
Release Date:2012-12-19

Description


[2.6.32-279.19.1.el6]
- [drm] i915: dont clobber the pipe param in sanitize_modesetting (Frantisek Hrbata) [876549 857792]
- [drm] i915: Sanitize BIOS debugging bits from PIPECONF (Frantisek Hrbata) [876549 857792]
- [net] fix divide by zero in tcp algorithm illinois (Flavio Leitner) [871920 866514] {CVE-2012-4565}
- [fs] xfs: fix reading of wrapped log data (Dave Chinner) [876499 874322]
- [x86] mm: fix signedness issue in mmap_rnd() (Petr Matousek) [876496 875036]
- [net] WARN if struct ip_options was allocated directly by kmalloc (Jiri Pirko) [877950 872799]
- [fs] block_dev: Fix crash when block device is read and block size is changed at the same time (Frantisek Hrbata) [864826 855906]
- [mm] tracing: Move include of trace/events/kmem.h out of header into slab.c (Jeff Moyer) [864826 855906]
- [mm] slab: Move kmalloc tracepoint out of inline code (Jeff Moyer) [864826 855906]
- [netdrv] bnx2x: organize BDs calculation for stop/resume (Frantisek Hrbata) [874022 819842]
- [netdrv] bnx2x: fix panic when TX ring is full (Michal Schmidt) [874022 819842]

[2.6.32-279.18.1.el6]
- [scsi] sd: fix crash when UA received on DIF enabled device (Ewan Milne) [876487 865682]
- [mm] hugetlb: fix non-atomic enqueue of huge page (Rafael Aquini) [876101 869750]
- [x86] amd_iommu: attach device fails on the last pci device (Don Dutile) [876493 861164]
- [net] nfs: Fix buffer overflow checking in __nfs4_get_acl_uncached (Frantisek Hrbata) [811794 822871] {CVE-2012-2375}
- [net] nfs: Fix the acl cache size calculation (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] nfs: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] nfs: nfs_getaclargs.acl_len is a size_t (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] nfs: Dont use private xdr_stream fields in decode_getacl (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] nfs: Fix pointer arithmetic in decode_getacl (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] nfs: Simplify the GETATTR attribute length calculation (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] sunrpc: Add the helper xdr_stream_pos (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] sunrpc: Dont decode beyond the end of the RPC reply message (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] sunrpc: Clean up xdr_set_iov() (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [net] sunrpc: xdr_read_pages needs to clear xdr->page_ptr (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [fs] nfs: Avoid beyond bounds copy while caching ACL (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [fs] nfs: Avoid reading past buffer when calling GETACL (Sachin Prabhu) [811794 822871] {CVE-2012-2375}
- [scsi] ibmvfc: Fix double completion on abort timeout (Steve Best) [876088 865115]
- [net] core: allocate skbs on local node (Andy Gospodarek) [876491 843163]

[2.6.32-279.17.1.el6]
- [mm] Prevent kernel panic in NUMA related system calls after memory hot-add (Larry Woodman) [875382 870350] {CVE-2012-5517}
- [md] Dont truncate size at 4TB for RAID0 and Linear (Jes Sorensen) [866470 865637]
- [fs] ext4: fix undefined bit shift result in ext4_fill_flex_info (Lukas Czerner) [809690 809691] {CVE-2012-2100}
- [fs] ext4: fix undefined behavior in ext4_fill_flex_info() (Lukas Czerner) [809690 809691] {CVE-2012-2100}
- [kernel] sched_rt: Ignore RT queue throttling if idle task has RT policy (Igor Mammedov) [853950 843541]
- [kernel] sched: Create special class for stop/migrate work (Igor Mammedov) [853950 843541]
- [net] ipv6: fix overlap check for fragments (Amerigo Wang) [874550 819952] {CVE-2012-4444}
- [net] ipv6: discard overlapping fragment (Jiri Pirko) [874550 819952] {CVE-2012-4444}

[2.6.32-279.16.1.el6]
- [lib] Fix rwsem to not hang the system (David Howells) [871854 852847]

[2.6.32-279.15.1.el6]
- [netdrv] mlx4: Re-design multicast attachments flow (Doug Ledford) [866795 859533]


Related CVEs


CVE-2012-2100
CVE-2012-2375
CVE-2012-4444
CVE-2012-4565
CVE-2012-5517

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-279.19.1.el6.src.rpm905d73891bf38ea8fbd1d503f050f39e0f8eb171ad65a16b7e3c22e242493df6ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-279.19.1.el6.src.rpm905d73891bf38ea8fbd1d503f050f39e0f8eb171ad65a16b7e3c22e242493df6ELSA-2024-1831ol6_u3_i386_patch
kernel-2.6.32-279.19.1.el6.i686.rpm15d2e5fbbbe30b45e8c998c9ce86911c7e136e1133a3bb8099ecdc8d23da34dbELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-279.19.1.el6.i686.rpm15d2e5fbbbe30b45e8c998c9ce86911c7e136e1133a3bb8099ecdc8d23da34dbELSA-2024-1831ol6_u3_i386_patch
kernel-debug-2.6.32-279.19.1.el6.i686.rpm95615cc946b58d0ab6817851957f2b030c0d86a0197ac5a964a90c3855e7c393ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-279.19.1.el6.i686.rpm95615cc946b58d0ab6817851957f2b030c0d86a0197ac5a964a90c3855e7c393ELSA-2024-1831ol6_u3_i386_patch
kernel-debug-devel-2.6.32-279.19.1.el6.i686.rpmd97d62db46490d206b59f8ff2b325bc5780fc94d098364a3ed6c1b44ca5d2ceeELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-279.19.1.el6.i686.rpmd97d62db46490d206b59f8ff2b325bc5780fc94d098364a3ed6c1b44ca5d2ceeELSA-2024-1831ol6_u3_i386_patch
kernel-devel-2.6.32-279.19.1.el6.i686.rpm4102304e02c6672b6b73469740c6212400353d01bce994f778606ebd3c13904eELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-279.19.1.el6.i686.rpm4102304e02c6672b6b73469740c6212400353d01bce994f778606ebd3c13904eELSA-2024-1831ol6_u3_i386_patch
kernel-doc-2.6.32-279.19.1.el6.noarch.rpma5edbe7e50f881bc3b83fc653068f67d390e53536fede1f999168e9b665a9370ELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-279.19.1.el6.noarch.rpma5edbe7e50f881bc3b83fc653068f67d390e53536fede1f999168e9b665a9370ELSA-2024-1831ol6_u3_i386_patch
kernel-firmware-2.6.32-279.19.1.el6.noarch.rpm436fb224fcd94714ac11f95d76db47c18e9ea50ca1ba4fb9bb605bcaabe1b5eeELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-279.19.1.el6.noarch.rpm436fb224fcd94714ac11f95d76db47c18e9ea50ca1ba4fb9bb605bcaabe1b5eeELSA-2024-1831ol6_u3_i386_patch
kernel-headers-2.6.32-279.19.1.el6.i686.rpm75d340bf93f5df2d4d7587b79b585ed6462b0956d1660e10df77306d149d1b19ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-279.19.1.el6.i686.rpm75d340bf93f5df2d4d7587b79b585ed6462b0956d1660e10df77306d149d1b19ELSA-2024-1831ol6_u3_i386_patch
perf-2.6.32-279.19.1.el6.i686.rpm8a3fe6a5a9e60496a0ec75de8471431e0a67f0a44cc1eed8a7c641754d46d9d2ELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-279.19.1.el6.i686.rpm8a3fe6a5a9e60496a0ec75de8471431e0a67f0a44cc1eed8a7c641754d46d9d2ELSA-2024-1831ol6_u3_i386_patch
python-perf-2.6.32-279.19.1.el6.i686.rpm25beb3ccf20d14a8fa3f37376015d6efa9a81e3c6ffd589e94c01deb99bb782cELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-279.19.1.el6.i686.rpm25beb3ccf20d14a8fa3f37376015d6efa9a81e3c6ffd589e94c01deb99bb782cELSA-2024-1831ol6_u3_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-279.19.1.el6.src.rpm905d73891bf38ea8fbd1d503f050f39e0f8eb171ad65a16b7e3c22e242493df6ELSA-2024-1831ol6_u3_x86_64_patch
kernel-2.6.32-279.19.1.el6.src.rpm905d73891bf38ea8fbd1d503f050f39e0f8eb171ad65a16b7e3c22e242493df6ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-279.19.1.el6.x86_64.rpmc2dd791c35b98a87fc2460d011466b07f93f79101fb7e5960ba478976a91fd7bELSA-2024-1831ol6_u3_x86_64_patch
kernel-2.6.32-279.19.1.el6.x86_64.rpmc2dd791c35b98a87fc2460d011466b07f93f79101fb7e5960ba478976a91fd7bELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-279.19.1.el6.x86_64.rpm2e6a4f458074aff226ff91c1ed38071786d28a72171c3a0a4c4ef8f69aebdb45ELSA-2024-1831ol6_u3_x86_64_patch
kernel-debug-2.6.32-279.19.1.el6.x86_64.rpm2e6a4f458074aff226ff91c1ed38071786d28a72171c3a0a4c4ef8f69aebdb45ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-279.19.1.el6.x86_64.rpm9785ee2dafea763230ba9a51486a5d6aca40c24c5776191bafd970b3ad7fc978ELSA-2024-1831ol6_u3_x86_64_patch
kernel-debug-devel-2.6.32-279.19.1.el6.x86_64.rpm9785ee2dafea763230ba9a51486a5d6aca40c24c5776191bafd970b3ad7fc978ELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-279.19.1.el6.x86_64.rpm01c45dc99d6eac7108f50f7fb65b8dff01999f75a47abfd227cdc1b60ca9297aELSA-2024-1831ol6_u3_x86_64_patch
kernel-devel-2.6.32-279.19.1.el6.x86_64.rpm01c45dc99d6eac7108f50f7fb65b8dff01999f75a47abfd227cdc1b60ca9297aELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-279.19.1.el6.noarch.rpma5edbe7e50f881bc3b83fc653068f67d390e53536fede1f999168e9b665a9370ELSA-2024-1831ol6_u3_x86_64_patch
kernel-doc-2.6.32-279.19.1.el6.noarch.rpma5edbe7e50f881bc3b83fc653068f67d390e53536fede1f999168e9b665a9370ELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-279.19.1.el6.noarch.rpm436fb224fcd94714ac11f95d76db47c18e9ea50ca1ba4fb9bb605bcaabe1b5eeELSA-2024-1831ol6_u3_x86_64_patch
kernel-firmware-2.6.32-279.19.1.el6.noarch.rpm436fb224fcd94714ac11f95d76db47c18e9ea50ca1ba4fb9bb605bcaabe1b5eeELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-279.19.1.el6.x86_64.rpm1b4fc49b81ae47aa358a275b842370c4e9e625d13efec154e5cd9260508dadebELSA-2024-1831ol6_u3_x86_64_patch
kernel-headers-2.6.32-279.19.1.el6.x86_64.rpm1b4fc49b81ae47aa358a275b842370c4e9e625d13efec154e5cd9260508dadebELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-279.19.1.el6.x86_64.rpm511cad5e04e3b4cf1fdd91f274a623212763d7d108c10d195d7ddd8f6d49196aELSA-2024-1831ol6_u3_x86_64_patch
perf-2.6.32-279.19.1.el6.x86_64.rpm511cad5e04e3b4cf1fdd91f274a623212763d7d108c10d195d7ddd8f6d49196aELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-279.19.1.el6.x86_64.rpmf3d54631232640157ed4b3cede177d49ca38de35e5d7b9f8baddec150dd84bdbELSA-2024-1831ol6_u3_x86_64_patch
python-perf-2.6.32-279.19.1.el6.x86_64.rpmf3d54631232640157ed4b3cede177d49ca38de35e5d7b9f8baddec150dd84bdbELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete