ELSA-2013-1034

ELSA-2013-1034 - kernel security and bug fix update

Type:SECURITY
Severity:LOW
Release Date:2013-07-10

Description


kernel
[2.6.18-348.12.1]
- Revert: [fs] afs: export a couple of core functions for AFS write support (Lukas Czerner) [960014 692071]
- Revert: [fs] ext4: drop ec_type from the ext4_ext_cache structure (Lukas Czerner) [960014 692071]
- Revert: [fs] ext4: handle NULL p_ext in ext4_ext_next_allocated_block() (Lukas Czerner) [960014 692071]
- Revert: [fs] ext4: make FIEMAP and delayed allocation play well together (Lukas Czerner) [960014 692071]
- Revert: [fs] ext4: Fix possibly very long loop in fiemap (Lukas Czerner) [960014 692071]
- Revert: [fs] ext4: prevent race while walking extent tree for fiemap (Lukas Czerner) [960014 692071]

[2.6.18-348.11.1]
- Revert: [kernel] kmod: make request_module() killable (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- Revert: [kernel] kmod: avoid deadlock from recursive kmod call (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- Revert: [kernel] wait_for_helper: remove unneeded do_sigaction() (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- Revert: [kernel] Fix ____call_usermodehelper errs being silently ignored (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- Revert: [kernel] wait_for_helper: SIGCHLD from u/s cause use-after-free (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- Revert: [kernel] kmod: avoid deadlock from recursive request_module call (Frantisek Hrbata) [957152 949568]
- Revert: [x86-64] non lazy sleazy fpu implementation (Prarit Bhargava) [948187 731531]
- Revert: [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]
- Revert: [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]
- Revert: [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]

[2.6.18-348.10.1]
- [net] Bluetooth: fix possible info leak in bt_sock_recvmsg() (Radomir Vrbovsky) [955600 955601] {CVE-2013-3224}
- [net] Bluetooth: HCI & L2CAP information leaks (Jacob Tanenbaum) [922415 922416] {CVE-2012-6544}
- [misc] signal: use __ARCH_HAS_SA_RESTORER instead of SA_RESTORER (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}
- [misc] signal: always clear sa_restorer on execve (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}
- [misc] signal: Def __ARCH_HAS_SA_RESTORER for sa_restorer clear (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}
- [net] cxgb4: zero out another firmware request struct (Jay Fenlason) [971872 872531]
- [net] cxgb4: clear out most firmware request structures (Jay Fenlason) [971872 872531]
- [kernel] Make futex_wait() use an hrtimer for timeout (Prarit Bhargava) [958021 864648]

[2.6.18-348.9.1]
- [net] tg3: buffer overflow in VPD firmware parsing (Jacob Tanenbaum) [949939 949940] {CVE-2013-1929}
- [net] atm: update msg_namelen in vcc_recvmsg() (Nikola Pajkovsky) [955222 955223] {CVE-2013-3222}
- [fs] ext4: prevent race while walking extent tree for fiemap (Lukas Czerner) [960014 692071]
- [fs] ext4: Fix possibly very long loop in fiemap (Lukas Czerner) [960014 692071]
- [fs] ext4: make FIEMAP and delayed allocation play well together (Lukas Czerner) [960014 692071]
- [fs] ext4: handle NULL p_ext in ext4_ext_next_allocated_block() (Lukas Czerner) [960014 692071]
- [fs] ext4: drop ec_type from the ext4_ext_cache structure (Lukas Czerner) [960014 692071]
- [fs] afs: export a couple of core functions for AFS write support (Lukas Czerner) [960014 692071]
- [net] llc: Fix missing msg_namelen update in llc_ui_recvmsg() (Jesper Brouer) [956096 956097] {CVE-2013-3231}
- [net] tipc: fix info leaks via msg_name in recv_msg/recv_stream (Jesper Brouer) [956148 956149] {CVE-2013-3235}
- [net] Bluetooth: RFCOMM Fix info leak in ioctl(RFCOMMGETDEVLIST) (Radomir Vrbovsky) [922406 922407] {CVE-2012-6545}
- [net] Bluetooth: RFCOMM - Fix info leak via getsockname() (Radomir Vrbovsky) [922406 922407] {CVE-2012-6545}
- [kernel] kmod: avoid deadlock from recursive request_module call (Frantisek Hrbata) [957152 949568]
- [kernel] wait_for_helper: SIGCHLD from u/s cause use-after-free (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- [kernel] Fix ____call_usermodehelper errs being silently ignored (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- [kernel] wait_for_helper: remove unneeded do_sigaction() (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- [kernel] kmod: avoid deadlock from recursive kmod call (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}
- [kernel] kmod: make request_module() killable (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}

[2.6.18-348.8.1]
- [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]

[2.6.18-348.7.1]
- [pci] intel-iommu: Prev devs with RMRRs from going in SI Domain (Tony Camuso) [957606 839334]


Related CVEs


CVE-2013-1929
CVE-2012-6544
CVE-2012-6545
CVE-2013-0914
CVE-2013-3222
CVE-2013-3224
CVE-2013-3231
CVE-2013-3235

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-2.6.18-348.12.1.el5.src.rpm1558789911e53b7f191c9a8007eb1c82ELSA-2019-4732
ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.src.rpm6f1ef16c425a38e46e1158609a811048-
oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.src.rpm900dbe0d000c7c8e800c159558398801-
kernel-2.6.18-348.12.1.el5.i686.rpm6d2efb3edfc7506d896f161c31e5edecELSA-2019-4732
kernel-PAE-2.6.18-348.12.1.el5.i686.rpmb4d8814c939aabf96fabdd60da16b655ELSA-2019-4732
kernel-PAE-devel-2.6.18-348.12.1.el5.i686.rpm7e50ee7272bff913db0b5ab25ba1c2daELSA-2019-4732
kernel-debug-2.6.18-348.12.1.el5.i686.rpm425ea224eb34f5020a0c61d9b46d7a9eELSA-2019-4732
kernel-debug-devel-2.6.18-348.12.1.el5.i686.rpm0e041a4841c56cc51f7a08beeb731ab2ELSA-2019-4732
kernel-devel-2.6.18-348.12.1.el5.i686.rpm5db1c18055bac7a1b5da06a8e704bcb1ELSA-2019-4732
kernel-doc-2.6.18-348.12.1.el5.noarch.rpmba4d3e3ebb9fe345cca7ee405ecad022ELSA-2019-4732
kernel-headers-2.6.18-348.12.1.el5.i386.rpm3851fc4a41b32fda66714eba276acd7bELSA-2019-4732
kernel-xen-2.6.18-348.12.1.el5.i686.rpm61e961ca42216a56f3482c0e1ab6d3f3ELSA-2019-4732
kernel-xen-devel-2.6.18-348.12.1.el5.i686.rpm322a2eb153bc80fc2ff01e7e69126c5aELSA-2019-4732
ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.i686.rpm6849fc192111fb2b6422a90b7f3c2477-
ocfs2-2.6.18-348.12.1.el5PAE-1.4.10-1.el5.i686.rpm3acf3edd4286448e956872f7536ce92d-
ocfs2-2.6.18-348.12.1.el5debug-1.4.10-1.el5.i686.rpm40b2ef0857f0403e5d1e71ee6d192b38-
ocfs2-2.6.18-348.12.1.el5xen-1.4.10-1.el5.i686.rpmdd1793ee378a166eb5966e2b5d485fbb-
oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.i686.rpmce0824143e72db1025c4803b2726eadb-
oracleasm-2.6.18-348.12.1.el5PAE-2.0.5-1.el5.i686.rpm6669006db2df7a8e342782c30796bd58-
oracleasm-2.6.18-348.12.1.el5debug-2.0.5-1.el5.i686.rpmbc8ddf5c9a83e47097718b70d353d389-
oracleasm-2.6.18-348.12.1.el5xen-2.0.5-1.el5.i686.rpmc058e40627cac2fc23aba565d62d58e4-
Oracle Linux 5 (ia64) kernel-2.6.18-348.12.1.el5.src.rpm1558789911e53b7f191c9a8007eb1c82ELSA-2019-4732
ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.src.rpm6f1ef16c425a38e46e1158609a811048-
oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.src.rpm900dbe0d000c7c8e800c159558398801-
kernel-2.6.18-348.12.1.el5.ia64.rpm3485f6b8a8c9c3c03e1df9e88f4f41e3ELSA-2019-4732
kernel-debug-2.6.18-348.12.1.el5.ia64.rpm4e4bd8a46b9515e3536a089325cd4badELSA-2019-4732
kernel-debug-devel-2.6.18-348.12.1.el5.ia64.rpmb5e9b659f7eeffc1d3d13446dad5c91dELSA-2019-4732
kernel-devel-2.6.18-348.12.1.el5.ia64.rpm087e56d19d93cdf779dab331bf73a8dfELSA-2019-4732
kernel-doc-2.6.18-348.12.1.el5.noarch.rpmba4d3e3ebb9fe345cca7ee405ecad022ELSA-2019-4732
kernel-headers-2.6.18-348.12.1.el5.ia64.rpm6420bb7871ae95bb8e378035bbde4246ELSA-2019-4732
kernel-xen-2.6.18-348.12.1.el5.ia64.rpm17b50f29dc8a031b348903c1d8df5406ELSA-2019-4732
kernel-xen-devel-2.6.18-348.12.1.el5.ia64.rpm73a913da6284cdac709f05214c06a164ELSA-2019-4732
ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.ia64.rpmcbfa6582c1f3dda07b4a48d820a942ff-
ocfs2-2.6.18-348.12.1.el5debug-1.4.10-1.el5.ia64.rpm2379bbedf24d9e4aedecdaa649897baf-
ocfs2-2.6.18-348.12.1.el5xen-1.4.10-1.el5.ia64.rpm88f6c04356b122f458e2c813d5007068-
oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.ia64.rpmda2b5e35c07b7a806b52b3b76ac9b094-
oracleasm-2.6.18-348.12.1.el5debug-2.0.5-1.el5.ia64.rpm79b086d4bedb3fe085ee84a6eb80e172-
oracleasm-2.6.18-348.12.1.el5xen-2.0.5-1.el5.ia64.rpmfafb33bb75ab5bbca4268142ed7d7e50-
Oracle Linux 5 (x86_64) kernel-2.6.18-348.12.1.el5.src.rpm1558789911e53b7f191c9a8007eb1c82ELSA-2019-4732
ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.src.rpm6f1ef16c425a38e46e1158609a811048-
oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.src.rpm900dbe0d000c7c8e800c159558398801-
kernel-2.6.18-348.12.1.el5.x86_64.rpm4221bf4bd5f1d970b65bb6caae2d4e81ELSA-2019-4732
kernel-debug-2.6.18-348.12.1.el5.x86_64.rpm6a1a0d231830a6a548271269c3461cc1ELSA-2019-4732
kernel-debug-devel-2.6.18-348.12.1.el5.x86_64.rpm19e4fac7545542eade218131b2bdb7bcELSA-2019-4732
kernel-devel-2.6.18-348.12.1.el5.x86_64.rpmd336c474c2fcce20b9050d7dd7d3c179ELSA-2019-4732
kernel-doc-2.6.18-348.12.1.el5.noarch.rpmba4d3e3ebb9fe345cca7ee405ecad022ELSA-2019-4732
kernel-headers-2.6.18-348.12.1.el5.x86_64.rpme9b142baf8b82fa24e07d1c87f92e05bELSA-2019-4732
kernel-xen-2.6.18-348.12.1.el5.x86_64.rpmbca79dd949e01a97714f4cee2c7a5df4ELSA-2019-4732
kernel-xen-devel-2.6.18-348.12.1.el5.x86_64.rpm9e2e53a3eacf3ca40973ed52753a3e60ELSA-2019-4732
ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.x86_64.rpmf4fab17e52e2b96a75a13f5dd1b3ad0e-
ocfs2-2.6.18-348.12.1.el5debug-1.4.10-1.el5.x86_64.rpmb3a0d6d11cec3599f95dd080c32e9593-
ocfs2-2.6.18-348.12.1.el5xen-1.4.10-1.el5.x86_64.rpm4213ca82870f15c8ef73cf8fd9d06c83-
oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.x86_64.rpm6cfb8da6ff3812bb38daa065361d8057-
oracleasm-2.6.18-348.12.1.el5debug-2.0.5-1.el5.x86_64.rpm73e8f6ea962e83ea65be23ba8b215137-
oracleasm-2.6.18-348.12.1.el5xen-2.0.5-1.el5.x86_64.rpm79239e943b0c96bd859abaf32d31bb47-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete