Oval Definition:oval:org.mitre.oval:def:27240
Revision Date:2015-03-16Version:12
Title:ELSA-2010-2009 -- Oracle Linux 5 Unbreakable Enterprise kernel security fix update (important)
Description:Following security bugs are fixed in this errataCVE-2010-3904When copying data to userspace, the RDS protocol failed to verify that the user-provided address was a validuserspace address. A local unprivileged user could issue specially crafted socket calls to write arbitraryvalues into kernel memory and potentially escalate privileges to root.CVE-2010-3067Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allowslocal users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submitsystem call.CVE-2010-3477The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueingfunctionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, whichallows local users to obtain potentially sensitive information from kernel memory via vectors involving a dumpoperation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.kernel:[2.6.32-100.21.1.el5]- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch- [aio] linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patchofa:[1.5.1-4.0.23]- Fix rds permissions checks during copies[1.5.1-4.0.21]- Update to BXOFED 1.5.1-1.3.6-5
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2010-3067
CVE-2010-3477
CVE-2010-3904
ELSA-2010-2009
Platform(s):Oracle Linux 5
Product(s):kernel
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-firmware
kernel-headers
ofa
Definition Synopsis
  • Oracle Linux 5.x
  • AND Packages match section
  • kernel is earlier than 0:2.6.32-100.21.1.el5
  • OR kernel-debug is earlier than 0:2.6.32-100.21.1.el5
  • OR kernel-debug-devel is earlier than 0:2.6.32-100.21.1.el5
  • OR kernel-devel is earlier than 0:2.6.32-100.21.1.el5
  • OR kernel-doc is earlier than 0:2.6.32-100.21.1.el5
  • OR kernel-firmware is earlier than 0:2.6.32-100.21.1.el5
  • OR kernel-headers is earlier than 0:2.6.32-100.21.1.el5
  • OR ofa-2.6.32-100.21.1.el5 is earlier than 0:1.5.1-4.0.23
  • BACK