ELSA-2007-0936

ELSA-2007-0936 - Important: kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2007-09-30

Description


[2.6.18-8.1.14.0.2.el5]
- Fix bonding primary=ethX (Bert Barbe) [IT 101532] [ORA 5136660]
- Add entropy module option to e1000/bnx2 (John Sobecki) [ORA 6045759]

[2.6.18-8.1.14.el5]
- Revert changes back to 2.6.18-8.1.10.
- [x86_64] Zero extend all registers after ptrace in 32bit entry path
(Anton Arapov ) [297871] {CVE-2007-4573}

[2.6.18-8.1.12.el5]
- [x86_64] Don't leak NT bit into next task (Dave Anderson ) [298151]
{CVE-2007-4574}
- [fs] Reset current->pdeath_signal on SUID binary execution (Peter
Zijlstra ) [252307] {CVE-2007-3848}
- [misc] Bounds check ordering issue in random driver (Anton Arapov )
[275961] {CVE-2007-3105}
- [usb] usblcd: Locally triggerable memory consumption (Anton Arapov )
[276001] {CVE-2007-3513}
- [x86_64] Zero extend all registers after ptrace in 32bit entry path
(Anton Arapov ) [297871] {CVE-2007-4573}
- [net] igmp: check for NULL when allocating GFP_ATOMIC skbs (Neil
Horman ) [303281]

[2.6.18-8.1.11.el5]
- [xen] Guest access to MSR may cause system crash/data corruption
(Bhavana Nagendra ) [253312] {CVE-2007-3733}
- [dlm] A TCP connection to DLM port blocks DLM operations (Patrick
Caulfield ) [245922] {CVE-2007-3380}
- [ppc] 4k page mapping support for userspace in 64k kernels (Scott
Moser ) [275841] {CVE-2007-3850}
- [ptrace] NULL pointer dereference triggered by ptrace (Anton Arapov )
[275981] {CVE-2007-3731}
- [fs] hugetlb: fix prio_tree unit (Konrad Rzeszutek ) [253929]
{CVE-2007-4133}


Related CVEs


CVE-2007-4573

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-8.1.14.0.2.el5.src.rpm49fc635dcdb392b4ecaad8613aa5fb88ebc09f5e6a607ec4e2be15d9c3a8b592ELSA-2019-4732el5_ga_i386_patch
ocfs2-2.6.18-8.1.14.0.2.el5-1.2.6-6.el5.src.rpm1c74adae9178f61d19333cd673e285821893ff555ce15b13254683ad54a61c77ELBA-2008-2004el5_ga_i386_patch
oracleasm-2.6.18-8.1.14.0.2.el5-2.0.4-1.el5.src.rpmc04aedc025af5db89b636ee70601aae3afbe229639d661a2df54bc3b0e96b66f-el5_ga_i386_patch
kernel-2.6.18-8.1.14.0.2.el5.i686.rpmd6d282d878eed31e613aa56f9df36926b797667e68f54bb9dbf86b61a78fcbdaELSA-2019-4732el5_ga_i386_patch
kernel-PAE-2.6.18-8.1.14.0.2.el5.i686.rpmeeb308cf104d52b05644bc62c4ad588969a949b0cefbed8e5c330ff01f807097ELSA-2019-4732el5_ga_i386_patch
kernel-PAE-devel-2.6.18-8.1.14.0.2.el5.i686.rpm9120206a196a7223f616e913e7d18985d27a67c86068f6c0a4b907e7026a0308ELSA-2019-4732el5_ga_i386_patch
kernel-devel-2.6.18-8.1.14.0.2.el5.i686.rpmd1c964023e5038155bd79de198f74842bfff6e2228b11c275d5b06fbadee31baELSA-2019-4732el5_ga_i386_patch
kernel-doc-2.6.18-8.1.14.0.2.el5.noarch.rpmb845f1e70068e729ff57e5a95686f89bbdecf8e6782bd01e253343a2910f4951ELSA-2019-4732el5_ga_i386_patch
kernel-headers-2.6.18-8.1.14.0.2.el5.i386.rpmca59a24ce8a07d4f93db05c507e93a90c58e443540db10daa393d38a7d1d7d45ELSA-2019-4732el5_ga_i386_patch
kernel-xen-2.6.18-8.1.14.0.2.el5.i686.rpm93fe4ef2ff3bcb3ee803ae04c074ad4e99be310fe193425742d2d35a4b03a155ELSA-2019-4732el5_ga_i386_patch
kernel-xen-devel-2.6.18-8.1.14.0.2.el5.i686.rpm6cc432b767f546a0eae1e9cb079c9aaaa48b2722a5433459d92391ca39ea8698ELSA-2019-4732el5_ga_i386_patch
ocfs2-2.6.18-8.1.14.0.2.el5-1.2.6-6.el5.i686.rpm9474804809c22c7623ef52559ae1a21e86f78d9d0d9547595ffcbc556f577f62ELBA-2008-2004el5_ga_i386_patch
ocfs2-2.6.18-8.1.14.0.2.el5PAE-1.2.6-6.el5.i686.rpm65397533def0fc4a217a67a3ef6f8c35c222da30913695c039e829f5cf4dff94ELBA-2008-2004el5_ga_i386_patch
ocfs2-2.6.18-8.1.14.0.2.el5xen-1.2.6-6.el5.i686.rpm4859664a7d2b0b4a08708f3dd295b1c9fd7385ef8fe4e57e496fbc3921450a77ELBA-2008-2004el5_ga_i386_patch
oracleasm-2.6.18-8.1.14.0.2.el5-2.0.4-1.el5.i686.rpm9deec23d514727c0c05f86c4fd417d1fb63284ad1d720cce75325e2eb598f96d-el5_ga_i386_patch
oracleasm-2.6.18-8.1.14.0.2.el5PAE-2.0.4-1.el5.i686.rpmdab98256e3333dbb74060afa9ee2c097bdbb6bdf97f944bf980a4ae13b0da63d-el5_ga_i386_patch
oracleasm-2.6.18-8.1.14.0.2.el5xen-2.0.4-1.el5.i686.rpm75cadc1db10e6e0bd023f8e3b9b95178e88bee70ef928f100608cbf32ebda053-el5_ga_i386_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-8.1.14.0.2.el5.src.rpm49fc635dcdb392b4ecaad8613aa5fb88ebc09f5e6a607ec4e2be15d9c3a8b592ELSA-2019-4732el5_ga_x86_64_patch
ocfs2-2.6.18-8.1.14.0.2.el5-1.2.6-6.el5.src.rpm1c74adae9178f61d19333cd673e285821893ff555ce15b13254683ad54a61c77ELBA-2008-2004el5_ga_x86_64_patch
oracleasm-2.6.18-8.1.14.0.2.el5-2.0.4-1.el5.src.rpmc04aedc025af5db89b636ee70601aae3afbe229639d661a2df54bc3b0e96b66f-el5_ga_x86_64_patch
kernel-2.6.18-8.1.14.0.2.el5.x86_64.rpm1eaf95ed4f8fa4b48de9c0cec20ac3e63c1fa66d89e86e87f2f7ccffb3b50f0dELSA-2019-4732el5_ga_x86_64_patch
kernel-devel-2.6.18-8.1.14.0.2.el5.x86_64.rpmd5e652f7e6694c9bb7f49fc2a64608f9d3f62aa9d263e110cc4e6bdc489f5676ELSA-2019-4732el5_ga_x86_64_patch
kernel-doc-2.6.18-8.1.14.0.2.el5.noarch.rpmb845f1e70068e729ff57e5a95686f89bbdecf8e6782bd01e253343a2910f4951ELSA-2019-4732el5_ga_x86_64_patch
kernel-headers-2.6.18-8.1.14.0.2.el5.x86_64.rpm2f2e7e22db7454d74757bc6580b68b91f04f8c33312b95485f5bceb1df6eaa63ELSA-2019-4732el5_ga_x86_64_patch
kernel-xen-2.6.18-8.1.14.0.2.el5.x86_64.rpmaea72784cedb3fe106e4a7e3aad5fef40eedec811d1cd14541cca4556ab47d61ELSA-2019-4732el5_ga_x86_64_patch
kernel-xen-devel-2.6.18-8.1.14.0.2.el5.x86_64.rpm41ee9612333e58b64f25e259f251ddb82386a8134dbd57a0f0c81170d53c6e2cELSA-2019-4732el5_ga_x86_64_patch
ocfs2-2.6.18-8.1.14.0.2.el5-1.2.6-6.el5.x86_64.rpm34b3024c86966b683c088f6072d6175de48b1540eec35c6c2ef39c4625e9b1feELBA-2008-2004el5_ga_x86_64_patch
ocfs2-2.6.18-8.1.14.0.2.el5xen-1.2.6-6.el5.x86_64.rpmdd23a1319f57e7659b8097c6e08975d18873065c8718cfd1a93d49252c68f535ELBA-2008-2004el5_ga_x86_64_patch
oracleasm-2.6.18-8.1.14.0.2.el5-2.0.4-1.el5.x86_64.rpmab8f7ca6a9eadd70c70242868dd88299cf6d7eeb6f899a1cf7095521dac2e697-el5_ga_x86_64_patch
oracleasm-2.6.18-8.1.14.0.2.el5xen-2.0.4-1.el5.x86_64.rpm235d213991fdeff5344a86d1d0ceb236f4f18e664788dad65c339dc1c1087db4-el5_ga_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete