Description: | Summary: The remote host is missing an update for the 'kernel-uek, ofa-2.6.32-300.3.1.el5uek, ofa-2.6.32-300.3.1.el6uek' package(s) announced via the ELSA-2011-2037 advisory.
Vulnerability Insight: [2.6.32-300.3.1.el6uek] - proc: fix oops on invalid /proc//maps access (Linux Torvalds)- Revert 'capabilities: do not grant full privs for setuid w/ file caps + no effective caps' (Joe Jin)- [mm]: Use MMF_COMPAT instead ia32_compat to prevent kabi be broken (Joe Jin)- proc: enable writing to /proc/pid/mem (Stephen Wilson)- proc: make check_mem_permission() return an mm_struct on success (Stephen Wilson)- proc: hold cred_guard_mutex in check_mem_permission() (Joe Jin)- proc: disable mem_write after exec (Stephen Wilson)- mm: implement access_remote_vm (Stephen Wilson)- mm: factor out main logic of access_process_vm (Stephen Wilson)- mm: use mm_struct to resolve gate vma's in __get_user_pages (Stephen Wilson)- mm: arch: rename in_gate_area_no_task to in_gate_area_no_mm (Stephen Wilson)- mm: arch: make in_gate_area take an mm_struct instead of a task_struct (Stephen Wilson)- mm: arch: make get_gate_vma take an mm_struct instead of a task_struct (Stephen Wilson)- x86: mark associated mm when running a task in 32 bit compatibility mode (Stephen Wilson)- x86: add context tag to mark mm when running a task in 32-bit compatibility mode (Stephen Wilson)- auxv: require the target to be tracable (or yourself) (Al Viro)- close race in /proc/*/environ (Al Viro)- report errors in /proc/*/*map* sanely (Al Viro)- pagemap: close races with suid execve (Al Viro)- make sessionid permissions in /proc/*/task/* match those in /proc/* (Al Viro)- Revert 'report errors in /proc/*/*map* sanely' (Joe Jin)- Revert 'proc: fix oops on invalid /proc//maps access' (Joe Jin)[2.6.32-300.2.1.el6uek]- [kabi] Add missing kabi (Srinivas Maturi)- report errors in /proc/*/*map* sanely (Joe Jin)[2.6.32-300.1.1.el6uek]- [SCSI] qla4xxx: fix build error for OL6 (Joe Jin)- Ecryptfs: Add mount option to check uid of device being mounted = expect uid (Maxim Uvarov)- proc: fix oops on invalid /proc//maps access (Linus Torvalds)- x86/mm: Fix pgd_lock deadlock (Joe Jin)- x86, mm: Hold mm->page_table_lock while doing vmalloc_sync (Joe Jin)- proc: restrict access to /proc/PID/io (Vasiliy Kulikov)- futex: Fix regression with read only mappings (Shawn Bohrer)- x86-32, vdso: On system call restart after SYSENTER, use int db_5.ELSA-2011-2037x80 (H. Peter Anvin)- x86, UV: Remove UV delay in starting slave cpus (Jack Steiner)- Include several Xen pv hugepage fixes. (Dave McCracken)- GRO: fix merging a paged skb after non-paged skbs (Michal Schmidt)- md/linear: avoid corrupting structure while waiting for rcu_free to complete. (NeilBrown)- xen: x86_32: do not enable interrupts when returning from exception in interrupt context (Igor Mammedov)- xen/smp: Warn user why they keel over - nosmp or noapic and what to use instead. (Konrad Rzeszutek Wilk)- hvc_console: Improve tty/console put_chars handling (Hendrik Brueckner)- 3w-9xxx: fix iommu_iova leak (James Bottomley)- aacraid: reset should disable MSI interrupt (Vasily Averin)- ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'kernel-uek, ofa-2.6.32-300.3.1.el5uek, ofa-2.6.32-300.3.1.el6uek' package(s) on Oracle Linux 5, Oracle Linux 6.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|