ELSA-2008-0885

ELSA-2008-0885 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2008-09-24

Description



[2.6.18-92.1.13.0.1.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]
- [NET] fix netpoll race (Tina Yang) [orabugz 5791]

[2.6.18-92.1.13.el5]
- [md] fix crashes in iterate_rdev (Doug Ledford ) [460128 455471]
- [sound] snd_seq_oss_synth_make_info info leak (Eugene Teo ) [458000 458001] {CVE-2008-3272}
- [ipmi] control BMC device ordering (peterm@redhat.com ) [459071 430157]
- [ia64] fix to check module_free parameter (Masami Hiramatsu ) [460639 457961]
- [misc] NULL pointer dereference in kobject_get_path (Jiri Pirko ) [459776 455460]
- [xen] ia64: SMP-unsafe with XENMEM_add_to_physmap on HVM (Tetsu Yamamoto ) [459780 457137]
- [net] bridge: eliminate delay on carrier up (Herbert Xu ) [458783 453526]
- [fs] dio: lock refcount operations (Jeff Moyer ) [459082 455750]
- [misc] serial: fix break handling for i82571 over LAN (Aristeu Rozanski ) [460509 440018]
- [fs] dio: use kzalloc to zero out struct dio (Jeff Moyer ) [461091 439918]
- [fs] lockd: nlmsvc_lookup_host called with f_sema held (Jeff Layton ) [459083 453094]
- [net] bnx2x: chip reset and port type fixes (Andy Gospodarek ) [441259 442026]

[2.6.18-92.1.12.el5]
- [mm] tmpfs: restore missing clear_highpage (Eugene Teo ) [426082 426083]{CVE-2007-6417}
- [fs] vfs: fix lookup on deleted directory (Eugene Teo ) [457865 457866]{CVE-2008-3275}
- [net] ixgbe: remove device ID for unsupported device (Andy Gospodarek ) [457484 454910]
- [ppc] Event Queue overflow on eHCA adapters (Brad Peters ) [458779 446713]

[2.6.18-92.1.11.el5]
- [mm] xpmem: inhibit page swapping under heavy mem use (George Beshers ) [456946 456574]
- [xen] HV: memory corruption with large number of cpus (Chris Lalancette ) [455768 449945]
- [fs] missing check before setting mount propagation (Eugene Teo ) [454392 454393]
- [openib] small ipoib packet can cause an oops (Doug Ledford ) [447913 445731]
- [misc] fix race in switch_uid and user signal accounting (Vince Worthington ) [456235 441762 440830]


Related CVEs


CVE-2007-6417
CVE-2007-6716
CVE-2008-3272
CVE-2008-2931
CVE-2008-3275

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-92.1.13.0.1.el5.src.rpm92c1306d6a8d7d7848aad92d02783cba3dbca4f8d209af11ce6346815f4ae662ELSA-2019-4732el5_u2_i386_patch
ocfs2-2.6.18-92.1.13.0.1.el5-1.2.9-1.el5.src.rpm87ead3df9dde2554526c68660ca531cebc43c95e1a6f482644d5541d2673b8b6-el5_u2_i386_patch
oracleasm-2.6.18-92.1.13.0.1.el5-2.0.4-1.el5.src.rpmabb0aaf7fa0a4a511294fce6c7f68abfa66e1b9a670af4bef822d89f2972e7c0-el5_u2_i386_patch
kernel-2.6.18-92.1.13.0.1.el5.i686.rpm46a0798d5d034c35c3e616515b7e3977e4f640631049c395b4b67755c3b22781ELSA-2019-4732el5_u2_i386_patch
kernel-PAE-2.6.18-92.1.13.0.1.el5.i686.rpm9fe428e0d3755d7550e969c1027d806213da3db251cc7da829157c8e376e7516ELSA-2019-4732el5_u2_i386_patch
kernel-PAE-devel-2.6.18-92.1.13.0.1.el5.i686.rpm49406940f6d3ddbe748a360fea018d7c498e7c40b00bd1a79076802d3fbc33beELSA-2019-4732el5_u2_i386_patch
kernel-debug-2.6.18-92.1.13.0.1.el5.i686.rpm43f3f55bb01ca65b5c0ec7bd7346a43d48b437201c5ecd6b55a7da6cbaa158a5ELSA-2019-4732el5_u2_i386_patch
kernel-debug-devel-2.6.18-92.1.13.0.1.el5.i686.rpmbb4ff1e4bef12794d3c489a2b61c80f36a785b01378019a0b6273b75f0346118ELSA-2019-4732el5_u2_i386_patch
kernel-devel-2.6.18-92.1.13.0.1.el5.i686.rpm90093bbba7ca34f6b004aadb9599c07b4bfa4fd2b2bfa80c8c405a71e70f07e3ELSA-2019-4732el5_u2_i386_patch
kernel-doc-2.6.18-92.1.13.0.1.el5.noarch.rpm6816f8c1f0c43305b978f74145bcb1f9f388b56428fbb625a489979406b25799ELSA-2019-4732el5_u2_i386_patch
kernel-headers-2.6.18-92.1.13.0.1.el5.i386.rpm0176a3f3a7bdc49f73f0828872aae03f5d2ca40b974be7e6c2b21bfefe81702cELSA-2019-4732el5_u2_i386_patch
kernel-xen-2.6.18-92.1.13.0.1.el5.i686.rpm8e59bd489d54ade4aa7f6d0fdba3844143b503076289958d1bd316d97d0fb415ELSA-2019-4732el5_u2_i386_patch
kernel-xen-devel-2.6.18-92.1.13.0.1.el5.i686.rpm17b395581363d189ca3b01ba434bf39a8d0b1c4f8703e546a7d2d3f8b08b4cc0ELSA-2019-4732el5_u2_i386_patch
ocfs2-2.6.18-92.1.13.0.1.el5-1.2.9-1.el5.i686.rpm969391b3648783421a0356aa8db2c07e91e0510940cc406520dea8a4f69431ca-el5_u2_i386_patch
ocfs2-2.6.18-92.1.13.0.1.el5PAE-1.2.9-1.el5.i686.rpm020da4b17a161e5be87fb8a7b82a7cf3b203a1a3c46ac1011437904dc1c65367-el5_u2_i386_patch
ocfs2-2.6.18-92.1.13.0.1.el5debug-1.2.9-1.el5.i686.rpm1967818deb9f3b5b23ac016937ccdd72abb9cd230fe3c740ca24ab85ff23c17e-el5_u2_i386_patch
ocfs2-2.6.18-92.1.13.0.1.el5xen-1.2.9-1.el5.i686.rpm7b19a293a71bce6b1927fdeac4e0ac01c33149b06bba2b903db8b73995cb1635-el5_u2_i386_patch
oracleasm-2.6.18-92.1.13.0.1.el5-2.0.4-1.el5.i686.rpm16a0275b6a94d9613a7f5d7b35a11b05f9250236e5897d50b7a40ccf9590331d-el5_u2_i386_patch
oracleasm-2.6.18-92.1.13.0.1.el5PAE-2.0.4-1.el5.i686.rpm9a57cca86ef69ef799c85ea08148940a201e4af58281dbfec79c4cab00f3638c-el5_u2_i386_patch
oracleasm-2.6.18-92.1.13.0.1.el5debug-2.0.4-1.el5.i686.rpm2ff699c288fb6324fa0bced1c584cdb2d287b87fd90b326076a3e63eab48417e-el5_u2_i386_patch
oracleasm-2.6.18-92.1.13.0.1.el5xen-2.0.4-1.el5.i686.rpm61a36a419c6e921993aeaafedde9c93847c92353e56c7e015074bba607a91cac-el5_u2_i386_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-92.1.13.0.1.el5.src.rpm92c1306d6a8d7d7848aad92d02783cba3dbca4f8d209af11ce6346815f4ae662ELSA-2019-4732el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.13.0.1.el5-1.2.9-1.el5.src.rpm87ead3df9dde2554526c68660ca531cebc43c95e1a6f482644d5541d2673b8b6-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.13.0.1.el5-2.0.4-1.el5.src.rpmabb0aaf7fa0a4a511294fce6c7f68abfa66e1b9a670af4bef822d89f2972e7c0-el5_u2_x86_64_patch
kernel-2.6.18-92.1.13.0.1.el5.x86_64.rpmbe81dffe47395e149f300730dc5abd130b4157920ecb48819ac0c0417afb61b6ELSA-2019-4732el5_u2_x86_64_patch
kernel-debug-2.6.18-92.1.13.0.1.el5.x86_64.rpm4aa95a0362131a585eb962defec836ea81259406f7355db8c8c5a5923b21e554ELSA-2019-4732el5_u2_x86_64_patch
kernel-debug-devel-2.6.18-92.1.13.0.1.el5.x86_64.rpmb154810e59b1f0cf2b86ffaf697b9f62ee027243f83ca80045c7998472294ad9ELSA-2019-4732el5_u2_x86_64_patch
kernel-devel-2.6.18-92.1.13.0.1.el5.x86_64.rpm35c609a2f6ccd069eb7f332d9449c4e4092b3657a5a3b7a8c71c523b9c9057beELSA-2019-4732el5_u2_x86_64_patch
kernel-doc-2.6.18-92.1.13.0.1.el5.noarch.rpm6816f8c1f0c43305b978f74145bcb1f9f388b56428fbb625a489979406b25799ELSA-2019-4732el5_u2_x86_64_patch
kernel-headers-2.6.18-92.1.13.0.1.el5.x86_64.rpm7b3dc6cd13b31978c1467d370d281f30c176a9f6784ca6303c42abef1111d76bELSA-2019-4732el5_u2_x86_64_patch
kernel-xen-2.6.18-92.1.13.0.1.el5.x86_64.rpm29629097266541f9771046a62e6fe577fd84d8d7c1cbaf4c881e2a4d553157baELSA-2019-4732el5_u2_x86_64_patch
kernel-xen-devel-2.6.18-92.1.13.0.1.el5.x86_64.rpm264023583ed5f6d9b7be3db58a8ae0804702d0236762983eab39ce00e283d373ELSA-2019-4732el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.13.0.1.el5-1.2.9-1.el5.x86_64.rpm0005659e220c11d923fd5dc9d245a1a9d85ae5ea4859e48eccf40f419574ec48-el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.13.0.1.el5debug-1.2.9-1.el5.x86_64.rpm3300ac10e808e747d50b3e5464cc1e5ec4b8c6ca8f913b81f7f8791fcf9309c8-el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.13.0.1.el5xen-1.2.9-1.el5.x86_64.rpmcfa96a7bb8a9a619574d6cc40c28db949c58fcad854cda9c166dc0686f87cd22-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.13.0.1.el5-2.0.4-1.el5.x86_64.rpmee606da619adad1a19fccde94c166b63a5349fbe48843bb5789e17ba7e4819b3-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.13.0.1.el5debug-2.0.4-1.el5.x86_64.rpm8b719b9c4f90a05d8bac6282b0a57f80a479333c079fcd31750ca4a36813f406-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.13.0.1.el5xen-2.0.4-1.el5.x86_64.rpme13443897969e78c88350be0fddf9950fbec717adad373d9c120a2b127c5e6f7-el5_u2_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete