ELSA-2008-1017

ELSA-2008-1017 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2008-12-17

Description


[2.6.18-92.1.22.0.1.el5]
- [net] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [net] Add xen pv/bonding netconsole support (Tina yang) [orabug 6993043] [bz 7258]
- [mm] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- [nfs] nfs attribute timeout fix (Trond Myklebust) [orabug 7156607] [RHBZ 446083]
- [xen] execshield: fix endless GPF fault loop (Stephen Tweedie) [orabug 7175395]

[2.6.18-92.1.22.el5]
- [misc] hugepages: ia64 stack overflow and corrupt memory (Larry Woodman ) [474347 472802]
- [misc] allow hugepage allocation to use most of memory (Larry Woodman ) [474760 438889]

[2.6.18-92.1.21.el5]
- [misc] rtc: disable SIGIO notification on close (Vitaly Mayatskikh ) [465746 465747]

[2.6.18-92.1.20.el5]
- [input] atkbd: cancel delayed work before freeing struct (Jiri Pirko ) [461232 461233]
- [drm] i915 driver arbitrary ioremap (Eugene Teo ) [464508 464509] {CVE-2008-3831}
- [fs] don't allow splice to files opened with O_APPEND (Eugene Teo ) [466709 466710] {CVE-2008-4554}
- [xen] x86: allow the kernel to boot on pre-64 bit hw (Chris Lalancette ) [470040 468083]
- [net] ipv4: fix byte value boundary check (Jiri Pirko ) [469649 468148]
- [ia64] fix ptrace hangs when following threads (Denys Vlasenko ) [469150 461456]
- [net] sctp: INIT-ACK indicates no AUTH peer support oops (Eugene Teo ) [466081 466082] {CVE-2008-4576}
- [input] atkbd: delay executing of LED switching request (Jiri Pirko ) [461232 461233]
- [xen] ia64: make viosapic SMP-safe by adding lock/unlock (Tetsu Yamamoto ) [467727 466552]
- [xen] allow guests to hide the TSC from applications (Chris Lalancette ) [378471 378481] {CVE-2007-5907}
- [nfs] v4: don't reuse expired nfs4_state_owner structs (Jeff Layton ) [469650 441884]
- [nfs] v4: credential ref leak in nfs4_get_state_owner (Jeff Layton ) [469650 441884]
- [nfs] v4: Poll aggressively when handling NFS4ERR_DELAY (Jeff Layton ) [469650 441884]
- [xen] ia64: speed up hypercall for guest domain creation (Tetsu Yamamoto ) [459080 456171]
- [xen] use unlocked_ioctl in evtchn, gntdev and privcmd (Tetsu Yamamoto ) [459080 456171]
- [xen] page scrub: serialise softirq with a new lock (Tetsu Yamamoto ) [459080 456171]
- [xen] serialize scrubbing pages (Tetsu Yamamoto ) [459080 456171]
- [nfs] pages of a memory mapped file get corrupted (Peter Staubach ) [450335 435291]
- [x86_64] xen: fix syscall return when tracing (Chris Lalancette ) [470853 453394]

[2.6.18-92.1.19.el5]
- Revert: [xen] allow guests to hide the TSC from applications (Chris Lalancette ) [378471 378481] {CVE-2007-5907}
- Revert: [xen] x86: allow the kernel to boot on pre-64 bit hw (Chris Lalancette ) [470040 468083]

[2.6.18-92.1.18.el5]
- [xen] x86: allow the kernel to boot on pre-64 bit hw (Chris Lalancette ) [470040 468083]


Related CVEs


CVE-2008-3831
CVE-2008-4554
CVE-2008-4576

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-2.6.18-92.1.22.0.1.el5.src.rpm441c1c8e4c18c856f4a2f99818943b93ELSA-2019-4732
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.src.rpmd741061f33dc6288a70799d2e56b336d-
ofa-2.6.18-92.1.22.0.1.el5-1.3.1-5.20080603.src.rpm76751938855dc199baf0d8c6b1369276-
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.src.rpm658c9c3959193524a66af35de7b30de7-
kernel-2.6.18-92.1.22.0.1.el5.i686.rpm84654afba835aaf74f73f1bcf58da527ELSA-2019-4732
kernel-PAE-2.6.18-92.1.22.0.1.el5.i686.rpm460168429e35257f91bfd4650502582eELSA-2019-4732
kernel-PAE-devel-2.6.18-92.1.22.0.1.el5.i686.rpm835775d869a83a7db0dc0e4358083329ELSA-2019-4732
kernel-debug-2.6.18-92.1.22.0.1.el5.i686.rpmd094c4fbce63e56e774fd599a5c3045fELSA-2019-4732
kernel-debug-devel-2.6.18-92.1.22.0.1.el5.i686.rpmd00809776c5fe20e82eab20c3dc56877ELSA-2019-4732
kernel-devel-2.6.18-92.1.22.0.1.el5.i686.rpm670c181649a6622e9cd2142512df216aELSA-2019-4732
kernel-doc-2.6.18-92.1.22.0.1.el5.noarch.rpm1fe15251bdd1d9499616aab4c9407f0eELSA-2019-4732
kernel-headers-2.6.18-92.1.22.0.1.el5.i386.rpm97e0f718f3042ff53a31dfce9d5969c5ELSA-2019-4732
kernel-xen-2.6.18-92.1.22.0.1.el5.i686.rpm0bd7bc9fbc34df03ccd999e2e969805eELSA-2019-4732
kernel-xen-devel-2.6.18-92.1.22.0.1.el5.i686.rpm114f438c287e16a7405ab37d507a4927ELSA-2019-4732
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.i686.rpm905f71b66a38f9add365af4ad25889fb-
ocfs2-2.6.18-92.1.22.0.1.el5PAE-1.2.9-1.el5.i686.rpmc0aad308db670227f5ecc41d69c593fb-
ocfs2-2.6.18-92.1.22.0.1.el5debug-1.2.9-1.el5.i686.rpm84c096a1a87acf801b8cd447fafa0208-
ocfs2-2.6.18-92.1.22.0.1.el5xen-1.2.9-1.el5.i686.rpmfb182938e67727bb6f044d928b767249-
ofa-2.6.18-92.1.22.0.1.el5-1.3.1-5.20080603.i686.rpmb6f7f6a8e3932512edb1c375e99e1c2c-
ofa-2.6.18-92.1.22.0.1.el5PAE-1.3.1-5.20080603.i686.rpmd71850d0e8b49a5ac035f746a277c98b-
ofa-2.6.18-92.1.22.0.1.el5xen-1.3.1-5.20080603.i686.rpm39f6af0da7734463de52c2898ea03e41-
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.i686.rpmfdae0d50cd96ae4e93f007920f91e98b-
oracleasm-2.6.18-92.1.22.0.1.el5PAE-2.0.5-1.el5.i686.rpmc062e63ef8b4faa3214aabaa5c4eec8f-
oracleasm-2.6.18-92.1.22.0.1.el5debug-2.0.5-1.el5.i686.rpmf113fa2832d8b6fb658b13e40cddfbbc-
oracleasm-2.6.18-92.1.22.0.1.el5xen-2.0.5-1.el5.i686.rpm0b7ed00c291d8c9d645be5deece41a8e-
Oracle Linux 5 (x86_64) kernel-2.6.18-92.1.22.0.1.el5.src.rpm441c1c8e4c18c856f4a2f99818943b93ELSA-2019-4732
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.src.rpmd741061f33dc6288a70799d2e56b336d-
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.src.rpm658c9c3959193524a66af35de7b30de7-
kernel-2.6.18-92.1.22.0.1.el5.x86_64.rpm9d4a217dd5cf035a4eaa4fbef4ebe4fdELSA-2019-4732
kernel-debug-2.6.18-92.1.22.0.1.el5.x86_64.rpm6a88e8f4bb69e62ea1deee91a0f76ea8ELSA-2019-4732
kernel-debug-devel-2.6.18-92.1.22.0.1.el5.x86_64.rpm77f35bda935a5cfecb58b0f783a818d4ELSA-2019-4732
kernel-devel-2.6.18-92.1.22.0.1.el5.x86_64.rpm0ee33915971443aa0f43aba57664351cELSA-2019-4732
kernel-doc-2.6.18-92.1.22.0.1.el5.noarch.rpm1fe15251bdd1d9499616aab4c9407f0eELSA-2019-4732
kernel-headers-2.6.18-92.1.22.0.1.el5.x86_64.rpm34670e7ef7e9f2092a0e7260521e04f1ELSA-2019-4732
kernel-xen-2.6.18-92.1.22.0.1.el5.x86_64.rpmf224f69cc907b7e382ec1f3f1095b661ELSA-2019-4732
kernel-xen-devel-2.6.18-92.1.22.0.1.el5.x86_64.rpm588b0d82c00db8451d043a839190e86eELSA-2019-4732
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.x86_64.rpmf790bbf68f65a17c8e079c63f4885a39-
ocfs2-2.6.18-92.1.22.0.1.el5debug-1.2.9-1.el5.x86_64.rpm3f46c1dd7b1083d4234ef536e60c8b16-
ocfs2-2.6.18-92.1.22.0.1.el5xen-1.2.9-1.el5.x86_64.rpmc46665718b5978ceee1f0d01920e5458-
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.x86_64.rpmf90b31a5dac0cc8a4f399cd0c13ca064-
oracleasm-2.6.18-92.1.22.0.1.el5debug-2.0.5-1.el5.x86_64.rpm609af7a434f8aa69fb105eeef82d9c06-
oracleasm-2.6.18-92.1.22.0.1.el5xen-2.0.5-1.el5.x86_64.rpmca4d97cf0eb32ab9172d846a937f9552-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete