ELSA-2007-0347

ELSA-2007-0347 - Important: kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2007-06-26

Description


[2.6.18-8.1.4.0.1.el5]
-Fix bonding primary=ethX so it picks correct network (Bert Barbe) [IT
101532] [ORA 5136660]
-Add entropy module option to e1000 (John Sobecki) [ORA 6045759]
-Add entropy module option to bnx2 (John Sobecki) [ORA 6045759]

[2.6.18.8.1.4.el5]
- [ipv6] Fix routing regression. (David S. Miller ) [238046]
- [mm] Gdb does not accurately output the backtrace. (Dave Anderson )
[235511]
- [NMI] change watchdog timeout to 30 seconds (Larry Woodman ) [237655]
- [dlm] fix mode munging (David Teigland ) [238731]
- [net] kernel-headers: missing include of types.h (Neil Horman ) [238749]
- [net] fib_semantics.c out of bounds check (Thomas Graf ) [238948]
{CVE-2007-2172}
- [net] disallow RH0 by default (Thomas Graf ) [238949] {CVE-2007-2242}
- [net] Fix user OOPS'able bug in FIB netlink (David S. Miller )
[238960] {CVE-2007-1861}
- [net] IPv6 fragments bypass in nf_conntrack netfilter code (Thomas
Graf ) [238947] {CVE-2007-1497}
- [net] ipv6_fl_socklist is inadvertently shared (David S. Miller )
[238944] {CVE-2007-1592}
- [net] Various NULL pointer dereferences in netfilter code (Thomas Graf
) [238946] {CVE-2007-1496}

[2.6.18-8.1.3.el5]
- [s390] page_mkclean causes data corruption on s390 (Jan Glauber ) [236605]

[2.6.18-8.1.2.el5]
- [utrace] exploit and unkillable cpu fixes (Roland McGrath ) [228816]
(CVE-2007-0771)
- [net] IPV6 security holes in ipv6_sockglue.c - 2 (David S. Miller )
[232257] {CVE-2007-1000}
- [net] IPV6 security holes in ipv6_sockglue.c (David S. Miller )
[232255] {CVE-2007-1388}
- [audit] GFP_KERNEL allocations in non-blocking context fix (Alexander
Viro ) [233157]

[2.6.18-8.1.1.el5]
- [cpufreq] Remove __initdata from tscsync (Prarit Bhargava ) [229887]
- [security] Fix key serial number collision problem (David Howells )
[229883] {CVE-2007-0006}
- [fs] Don't core dump read-only binarys (Don Howard ) [229885]
{CVE-2007-0958}
- [xen] Enable booting on machines with > 64G (Chris Lalancette) [230117]
- Fix potential buffer overflow in cardman 4040 cmx driver (Don Howard)
[229884] {CVE-2007-0005}


Related CVEs


CVE-2007-0958
CVE-2007-1000
CVE-2007-2242
CVE-2007-1388
CVE-2007-1497
CVE-2007-1592
CVE-2007-1861
CVE-2007-0005
CVE-2007-2172
CVE-2007-1496
CVE-2007-0006
CVE-2007-0771

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-8.1.4.0.1.el5.src.rpmaa3945672d9ad60136e277086faa249acb45d86e69059a6fc9b523f73a626471ELSA-2019-4732el5_ga_i386_patch
ocfs2-2.6.18-8.1.4.0.1.el5-1.2.6-1.el5.src.rpm4d9ca2514071e203c2179d5545c9f6a03e7c1b89d6094b1c84c161ff978809a1ELBA-2008-2004el5_ga_i386_patch
oracleasm-2.6.18-8.1.4.0.1.el5-2.0.4-1.el5.src.rpm3e6c09f907719f30e8368019aebd256a7f7c8c2b3c074e4a81c147cd1b84cabf-el5_ga_i386_patch
kernel-2.6.18-8.1.4.0.1.el5.i686.rpm7baade5f91b43169cfb768c7c0b11e5c177ca204016c77f00cb304fa4b1ce711ELSA-2019-4732el5_ga_i386_patch
kernel-PAE-2.6.18-8.1.4.0.1.el5.i686.rpm16abfa109bca261a4914a4505b5e0b23af226b32ba1d4df2f662d1c9a6980c3eELSA-2019-4732el5_ga_i386_patch
kernel-PAE-devel-2.6.18-8.1.4.0.1.el5.i686.rpma7c358bfa963fb2f3bb11a435bc5804358078df69dc0803cb0fb3ec2b91c1667ELSA-2019-4732el5_ga_i386_patch
kernel-devel-2.6.18-8.1.4.0.1.el5.i686.rpmc490a7f2ae0ae88da2eb31bf14941de3e92daed07c0bb65359a6cb9998c68c32ELSA-2019-4732el5_ga_i386_patch
kernel-doc-2.6.18-8.1.4.0.1.el5.noarch.rpm976bbf9b8da28bd29616e8b399894fb3c3cff1c20131184bdcab9e196b0f07d2ELSA-2019-4732el5_ga_i386_patch
kernel-headers-2.6.18-8.1.4.0.1.el5.i386.rpm7d13c04856de61b374eeaf2ff677e9a904191e0f2735b479f15f5e1ae0082d42ELSA-2019-4732el5_ga_i386_patch
kernel-xen-2.6.18-8.1.4.0.1.el5.i686.rpm5acf20c96bc26adb03be7c4d39aa5a6d5aa62a1a43d9f2992dbf74ff1ebddf63ELSA-2019-4732el5_ga_i386_patch
kernel-xen-devel-2.6.18-8.1.4.0.1.el5.i686.rpm84bc52708aa7a299b0af80a61c837f687e278d391927597e0416241e00bd9d91ELSA-2019-4732el5_ga_i386_patch
ocfs2-2.6.18-8.1.4.0.1.el5-1.2.6-1.el5.i386.rpm25c79998449b0dd74be4e422bde2112ed60e905e7774b81402b800a578dde847ELBA-2008-2004el5_ga_i386_patch
ocfs2-2.6.18-8.1.4.0.1.el5-1.2.6-1.el5.i686.rpm017dd78d8d16bb45fbc059f57fd505dddbc4603f65ccd868ccae8820d41e41c7ELBA-2008-2004el5_ga_i386_patch
ocfs2-2.6.18-8.1.4.0.1.el5PAE-1.2.6-1.el5.i686.rpm2bde9272a750261a76253ff9f2b25ee02f09d89c40a85274fb2eca64c6a83760ELBA-2008-2004el5_ga_i386_patch
ocfs2-2.6.18-8.1.4.0.1.el5xen-1.2.6-1.el5.i686.rpm4321b1435cf0dd1bcbe6db6b89441619df12f5b9d74f217cf4f79d63e0d47d00ELBA-2008-2004el5_ga_i386_patch
oracleasm-2.6.18-8.1.4.0.1.el5-2.0.4-1.el5.i386.rpmab7503e6db074b3553c85ac9837485877ef36cebe00c1d4509169501f8f216b8-el5_ga_i386_patch
oracleasm-2.6.18-8.1.4.0.1.el5-2.0.4-1.el5.i686.rpm2b0a4f050255a8b675bf7ab4278e7f61b600f69072141509291495ea627f19e9-el5_ga_i386_patch
oracleasm-2.6.18-8.1.4.0.1.el5PAE-2.0.4-1.el5.i686.rpm6caf7d2402fc9c1652e5b5024f0df876d5786a288e5b041c4a4c01e771885793-el5_ga_i386_patch
oracleasm-2.6.18-8.1.4.0.1.el5xen-2.0.4-1.el5.i686.rpm9c174cc12d0be72925e6eca88726cb28bbfb6ce5a3a4956b0f4cab0bcf364faf-el5_ga_i386_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-8.1.4.0.1.el5.src.rpmaa3945672d9ad60136e277086faa249acb45d86e69059a6fc9b523f73a626471ELSA-2019-4732el5_ga_x86_64_patch
ocfs2-2.6.18-8.1.4.0.1.el5-1.2.6-1.el5.src.rpm4d9ca2514071e203c2179d5545c9f6a03e7c1b89d6094b1c84c161ff978809a1ELBA-2008-2004el5_ga_x86_64_patch
oracleasm-2.6.18-8.1.4.0.1.el5-2.0.4-1.el5.src.rpm3e6c09f907719f30e8368019aebd256a7f7c8c2b3c074e4a81c147cd1b84cabf-el5_ga_x86_64_patch
kernel-2.6.18-8.1.4.0.1.el5.x86_64.rpmfd2d5a1698fca318fd21cc1ea3772fc6ae79e2e4f58962f1ba9ce4eaeacd8008ELSA-2019-4732el5_ga_x86_64_patch
kernel-devel-2.6.18-8.1.4.0.1.el5.x86_64.rpm7b184b131ef387ffe5d03bab1e180e690220585147bcbcd6d2438b3c7347d8a0ELSA-2019-4732el5_ga_x86_64_patch
kernel-doc-2.6.18-8.1.4.0.1.el5.noarch.rpm976bbf9b8da28bd29616e8b399894fb3c3cff1c20131184bdcab9e196b0f07d2ELSA-2019-4732el5_ga_x86_64_patch
kernel-headers-2.6.18-8.1.4.0.1.el5.x86_64.rpmabaf20bd4b396844d5c8af0b0bce4f2d16c89f82f93430d4b6cb6021ba3c6d0eELSA-2019-4732el5_ga_x86_64_patch
kernel-xen-2.6.18-8.1.4.0.1.el5.x86_64.rpmcf99d153dedb14384026c6ceb696e09897efdd62d0bc8e6105931d5f95a471b6ELSA-2019-4732el5_ga_x86_64_patch
kernel-xen-devel-2.6.18-8.1.4.0.1.el5.x86_64.rpmd3de3fa8c77ae1756dac427656db9153de00af093f05e8e5b3c33e91dda154b0ELSA-2019-4732el5_ga_x86_64_patch
ocfs2-2.6.18-8.1.4.0.1.el5-1.2.6-1.el5.x86_64.rpm60bb350ada12411302081f98abafb0dd6e28ca0ff14543e142f8e8f26aa39522ELBA-2008-2004el5_ga_x86_64_patch
ocfs2-2.6.18-8.1.4.0.1.el5xen-1.2.6-1.el5.x86_64.rpma08fa755766f23110893b2858e67c192ba9af761ce4662c8adb1c2c2b5375621ELBA-2008-2004el5_ga_x86_64_patch
oracleasm-2.6.18-8.1.4.0.1.el5-2.0.4-1.el5.x86_64.rpma2c8f94b9eef619483def10d78a7aca38a57f792330c9bf4758d8804165e5e9f-el5_ga_x86_64_patch
oracleasm-2.6.18-8.1.4.0.1.el5xen-2.0.4-1.el5.x86_64.rpme7dbc3d5fd021610cd192c58456556c6446b68a3c95869ffdcf239f3ed5acc95-el5_ga_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete