Oracle Linux Security Advisory ELSA-2013-2542

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-uek-2.6.32-400.29.3.el6uek.i686.rpm
kernel-uek-debug-2.6.32-400.29.3.el6uek.i686.rpm
kernel-uek-debug-devel-2.6.32-400.29.3.el6uek.i686.rpm
kernel-uek-headers-2.6.32-400.29.3.el6uek.i686.rpm
kernel-uek-devel-2.6.32-400.29.3.el6uek.i686.rpm
kernel-uek-doc-2.6.32-400.29.3.el6uek.noarch.rpm
kernel-uek-firmware-2.6.32-400.29.3.el6uek.noarch.rpm
ofa-2.6.32-400.29.3.el6uek-1.5.1-4.0.58.i686.rpm
ofa-2.6.32-400.29.3.el6uekdebug-1.5.1-4.0.58.i686.rpm
mlnx_en-2.6.32-400.29.3.el6uek-1.5.7-0.1.i686.rpm
mlnx_en-2.6.32-400.29.3.el6uekdebug-1.5.7-0.1.i686.rpm

x86_64:
kernel-uek-firmware-2.6.32-400.29.3.el6uek.noarch.rpm
kernel-uek-doc-2.6.32-400.29.3.el6uek.noarch.rpm
kernel-uek-2.6.32-400.29.3.el6uek.x86_64.rpm
kernel-uek-headers-2.6.32-400.29.3.el6uek.x86_64.rpm
kernel-uek-devel-2.6.32-400.29.3.el6uek.x86_64.rpm
kernel-uek-debug-devel-2.6.32-400.29.3.el6uek.x86_64.rpm
kernel-uek-debug-2.6.32-400.29.3.el6uek.x86_64.rpm
ofa-2.6.32-400.29.3.el6uek-1.5.1-4.0.58.x86_64.rpm
ofa-2.6.32-400.29.3.el6uekdebug-1.5.1-4.0.58.x86_64.rpm
mlnx_en-2.6.32-400.29.3.el6uek-1.5.7-0.1.x86_64.rpm
mlnx_en-2.6.32-400.29.3.el6uekdebug-1.5.7-0.1.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.32-400.29.3.el6uek.src.rpm
https://oss.oracle.com:443/ol6/SRPMS-updates/ofa-2.6.32-400.29.3.el6uek-1.5.1-4.0.58.src.rpm
https://oss.oracle.com:443/ol6/SRPMS-updates/mlnx_en-2.6.32-400.29.3.el6uek-1.5.7-0.1.src.rpm



Description of changes:


[2.6.32-400.29.3.el6uek]
- block: do not pass disk names as format strings (Jerry Snitselaar) 
[Orabug: 17230124] {CVE-2013-2851}
- af_key: initialize satype in key_notify_policy_flush() (Nicolas 
Dichtel) [Orabug: 17370765] {CVE-2013-2237}
- Bluetooth: L2CAP - Fix info leak via getsockname() (Mathias Krause) 
[Orabug: 17371054] {CVE-2012-6544}
- Bluetooth: HCI - Fix info leak in getsockopt(HCI_FILTER) (Mathias 
Krause) [Orabug: 17371072] {CVE-2012-6544}
- ipv6: ip6_sk_dst_check() must not assume ipv6 dst (Eric Dumazet) 
[Orabug: 17371079] {CVE-2013-2232}
- sctp: Use correct sideffect command in duplicate cookie handling (Vlad 
Yasevich) [Orabug: 17371121] {CVE-2013-2206}
- sctp: deal with multiple COOKIE_ECHO chunks (Max Matveev) [Orabug: 
17372129] {CVE-2013-2206}

Oracle6: ELSA-2013-2542: kernel Important Security Update

The following updated rpms for Oracle Linux 6 have been uploaded to the Unbreakable Linux Network:

Summary

[2.6.32-400.29.3.el6uek] - block: do not pass disk names as format strings (Jerry Snitselaar) [Orabug: 17230124] {CVE-2013-2851} - af_key: initialize satype in key_notify_policy_flush() (Nicolas Dichtel) [Orabug: 17370765] {CVE-2013-2237} - Bluetooth: L2CAP - Fix info leak via getsockname() (Mathias Krause) [Orabug: 17371054] {CVE-2012-6544} - Bluetooth: HCI - Fix info leak in getsockopt(HCI_FILTER) (Mathias Krause) [Orabug: 17371072] {CVE-2012-6544} - ipv6: ip6_sk_dst_check() must not assume ipv6 dst (Eric Dumazet) [Orabug: 17371079] {CVE-2013-2232} - sctp: Use correct sideffect command in duplicate cookie handling (Vlad Yasevich) [Orabug: 17371121] {CVE-2013-2206} - sctp: deal with multiple COOKIE_ECHO chunks (Max Matveev) [Orabug: 17372129] {CVE-2013-2206}

SRPMs

https://oss.oracle.com:443/ol6/SRPMS-updates/kernel-uek-2.6.32-400.29.3.el6uek.src.rpm https://oss.oracle.com:443/ol6/SRPMS-updates/ofa-2.6.32-400.29.3.el6uek-1.5.1-4.0.58.src.rpm https://oss.oracle.com:443/ol6/SRPMS-updates/mlnx_en-2.6.32-400.29.3.el6uek-1.5.7-0.1.src.rpm

x86_64

kernel-uek-firmware-2.6.32-400.29.3.el6uek.noarch.rpm kernel-uek-doc-2.6.32-400.29.3.el6uek.noarch.rpm kernel-uek-2.6.32-400.29.3.el6uek.x86_64.rpm kernel-uek-headers-2.6.32-400.29.3.el6uek.x86_64.rpm kernel-uek-devel-2.6.32-400.29.3.el6uek.x86_64.rpm kernel-uek-debug-devel-2.6.32-400.29.3.el6uek.x86_64.rpm kernel-uek-debug-2.6.32-400.29.3.el6uek.x86_64.rpm ofa-2.6.32-400.29.3.el6uek-1.5.1-4.0.58.x86_64.rpm ofa-2.6.32-400.29.3.el6uekdebug-1.5.1-4.0.58.x86_64.rpm mlnx_en-2.6.32-400.29.3.el6uek-1.5.7-0.1.x86_64.rpm mlnx_en-2.6.32-400.29.3.el6uekdebug-1.5.7-0.1.x86_64.rpm

aarch64

i386

kernel-uek-2.6.32-400.29.3.el6uek.i686.rpm kernel-uek-debug-2.6.32-400.29.3.el6uek.i686.rpm kernel-uek-debug-devel-2.6.32-400.29.3.el6uek.i686.rpm kernel-uek-headers-2.6.32-400.29.3.el6uek.i686.rpm kernel-uek-devel-2.6.32-400.29.3.el6uek.i686.rpm kernel-uek-doc-2.6.32-400.29.3.el6uek.noarch.rpm kernel-uek-firmware-2.6.32-400.29.3.el6uek.noarch.rpm ofa-2.6.32-400.29.3.el6uek-1.5.1-4.0.58.i686.rpm ofa-2.6.32-400.29.3.el6uekdebug-1.5.1-4.0.58.i686.rpm mlnx_en-2.6.32-400.29.3.el6uek-1.5.7-0.1.i686.rpm mlnx_en-2.6.32-400.29.3.el6uekdebug-1.5.7-0.1.i686.rpm

Severity

Related News