ELSA-2008-0957

ELSA-2008-0957 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2008-11-05

Description



[2.6.18-92.1.17.0.1.el5]
- [MM] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- [NFS] nfs attribute timeout fix (Trond Myklebust) [orabug 7156607] [RHBZ 446083]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [NET] fix netpoll race (Tina Yang) [orabugz 5791]

[2.6.18-92.1.17.el5]

- Revert: [nfs] pages of a memory mapped file get corrupted (Peter Staubach ) [450335 435291]

[2.6.18-92.1.16.el5]

- [i386] vDSO: use install_special_mapping (Peter Zijlstra ) [460275 460276] {CVE-2008-3527}
- [scsi] aacraid: remove some quirk AAC_QUIRK_SCSI_32 bits (Tomas Henzl ) [466885 453472]
- [fs] remove SUID when splicing into an inode (Eric Sandeen ) [464451 464452] {CVE-2008-3833}
- [fs] open() allows setgid bit when user is not in group (Eugene Teo ) [463867 463687] {CVE-2008-4210}
- [xen] ia64: fix INIT injection (Tetsu Yamamoto ) [467105 464445]

[2.6.18-92.1.15.el5]

- [pci] fix problems with msi interrupt management (Neil Horman ) [461894 428696]
- [x86_64] revert time syscall changes (Prarit Bhargava ) [466427 461184]
- [xen] allow guests to hide the TSC from applications (Chris Lalancette ) [378471 378481] {CVE-2007-5907}
- [scsi] qla2xxx: additional residual-count correction (Marcus Barrow ) [465741 462117]
- [char] add range_is_allowed check to mmap_mem (Eugene Teo ) [460858 460857]
- [fs] binfmt_misc: avoid potential kernel stack overflow (Vitaly Mayatskikh ) [459464 459463]
- [misc] cpufreq: fix format string bug (Vitaly Mayatskikh ) [459461 459460]
- [dlm] user.c input validation fixes (David Teigland ) [458759 458760]
- [nfs] pages of a memory mapped file get corrupted (Peter Staubach ) [450335 435291]
- [x86_64] gettimeofday fixes for HPET, PMTimer, TSC (Prarit Bhargava ) [462860 250708]

[2.6.18-92.1.14.el5]

- [libata] ata_scsi_rbuf_get check for scatterlist usage (David Milburn ) [460638 455445]
- [net] random32: seeding improvement (Jiri Pirko ) [458021 458019]
- [x86_64] xen: local DOS due to NT bit leakage (Eugene Teo ) [457721 457722] {CVE-2006-5755}
- [fs] cifs: fix O_APPEND on directio mounts (Jeff Layton ) [462591 460063]
- [openib] race between QP async handler and destroy_qp (Brad Peters ) [458781 446109]
- [net] dccp_setsockopt_change integer overflow (Vitaly Mayatskikh ) [459232 459235] {CVE-2008-3276}
- [acpi] error attaching device data (peterm@redhat.com ) [460868 459670]
- [mm] optimize ZERO_PAGE in 'get_user_pages' and fix XIP (Anton Arapov ) [452667 452668] {CVE-2008-2372}
- [xen] xennet: coordinate ARP with backend network status (Herbert Xu ) [461457 458934]
- [xen] event channel lock and barrier (Markus Armbruster ) [461099 457086]
- [fs] fix bad unlock_page in pip_to_file() error path (Larry Woodman ) [462436 439917]


Related CVEs


CVE-2008-2372
CVE-2008-3833
CVE-2006-5755
CVE-2007-5907
CVE-2008-3276
CVE-2008-4210
CVE-2008-3527
CVE-2008-4302

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-92.1.17.0.1.el5.src.rpma76ca490cfa57dc2ae3721facebab2ac91c382e74039554bee585e6d273ab8a5ELSA-2019-4732el5_u2_i386_patch
ocfs2-2.6.18-92.1.17.0.1.el5-1.2.9-1.el5.src.rpm20a3cdcced70ac21b158f6707f635c642ee4a244bc01cbaeefcc87c2f0a8b279-el5_u2_i386_patch
oracleasm-2.6.18-92.1.17.0.1.el5-2.0.5-1.el5.src.rpmb0ca78a928ec32f6194d15ee91107aa90bc7d6e1e661dc37e5914ffc4b0ae481-el5_u2_i386_patch
kernel-2.6.18-92.1.17.0.1.el5.i686.rpm7d92d674708df1930c3cc264b8421a79489cc18e9218397a64a15661d64bc82cELSA-2019-4732el5_u2_i386_patch
kernel-PAE-2.6.18-92.1.17.0.1.el5.i686.rpm275f4185dc96adf48c677de46bc45107980f906b54b9316b8f86c590aeaaf573ELSA-2019-4732el5_u2_i386_patch
kernel-PAE-devel-2.6.18-92.1.17.0.1.el5.i686.rpm52ee1cb00714356ee53987fa597601855e9bdab2c7bd5399ce50b33d1e2b379aELSA-2019-4732el5_u2_i386_patch
kernel-debug-2.6.18-92.1.17.0.1.el5.i686.rpmfdae4ac0c756a1f1fce8cce125449ca31126aac208408c50cac541b1e1acc05aELSA-2019-4732el5_u2_i386_patch
kernel-debug-devel-2.6.18-92.1.17.0.1.el5.i686.rpm8aa032982d18aae1a1f9259fda46a80bd358b7b480396710d1e63ec994d7cd4aELSA-2019-4732el5_u2_i386_patch
kernel-devel-2.6.18-92.1.17.0.1.el5.i686.rpme6e6a318549ed9787ff0d21462b8414bb6af8477f25bf4f8cfc0534221e66707ELSA-2019-4732el5_u2_i386_patch
kernel-doc-2.6.18-92.1.17.0.1.el5.noarch.rpm9ea77e069a35740d2fa03728ea06e057999211cd903e22ccea66572f2176ff74ELSA-2019-4732el5_u2_i386_patch
kernel-headers-2.6.18-92.1.17.0.1.el5.i386.rpm603c1550f219f2c28ce5202135c3986c76c136575883a9a7e7090d0cb8f0173bELSA-2019-4732el5_u2_i386_patch
kernel-xen-2.6.18-92.1.17.0.1.el5.i686.rpm5769dcd3c6d3220a93a3bdd25dc521ba81a6e1607deaecd08d6940900611a471ELSA-2019-4732el5_u2_i386_patch
kernel-xen-devel-2.6.18-92.1.17.0.1.el5.i686.rpm20a209edf34b744c2b25e743f03cb90685969b30bbfac37ead3892ee1df1f48dELSA-2019-4732el5_u2_i386_patch
ocfs2-2.6.18-92.1.17.0.1.el5-1.2.9-1.el5.i686.rpm5f2dfca06e04305c2641ea3b57feb7b2a4adcc39b26614b0e3a9495f00efabf8-el5_u2_i386_patch
ocfs2-2.6.18-92.1.17.0.1.el5PAE-1.2.9-1.el5.i686.rpm3d3f185f34bfd6909721e2f1efa2dd0876605e7e900d3a5dde2035505644554c-el5_u2_i386_patch
ocfs2-2.6.18-92.1.17.0.1.el5debug-1.2.9-1.el5.i686.rpmba2080ec8c743345f5a018a758309bea67d4487c1f518f7c0163ccdcd85ff75e-el5_u2_i386_patch
ocfs2-2.6.18-92.1.17.0.1.el5xen-1.2.9-1.el5.i686.rpm55d4a9207b2a216d2cbb41077f8c508a30b2f36d69b1cd81470dd0a064d5bf47-el5_u2_i386_patch
oracleasm-2.6.18-92.1.17.0.1.el5-2.0.5-1.el5.i686.rpm73e23e7415f7c87e584f15db826d0a3b0e4db4bc066f39f742a343a520445971-el5_u2_i386_patch
oracleasm-2.6.18-92.1.17.0.1.el5PAE-2.0.5-1.el5.i686.rpm77c30449b6b93d78c735f3e0ebff314e15959656a330aea8800fb2c41d047149-el5_u2_i386_patch
oracleasm-2.6.18-92.1.17.0.1.el5debug-2.0.5-1.el5.i686.rpm379c3dcc641600b3cf9dd0fffcbc32e322ee91ca592156bf8f0cb6521850c8ac-el5_u2_i386_patch
oracleasm-2.6.18-92.1.17.0.1.el5xen-2.0.5-1.el5.i686.rpm2e609377573906595f63f7122574a7ecb7390c67dbad1d58dc866d774dfb145e-el5_u2_i386_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-92.1.17.0.1.el5.src.rpma76ca490cfa57dc2ae3721facebab2ac91c382e74039554bee585e6d273ab8a5ELSA-2019-4732el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.17.0.1.el5-1.2.9-1.el5.src.rpm20a3cdcced70ac21b158f6707f635c642ee4a244bc01cbaeefcc87c2f0a8b279-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.17.0.1.el5-2.0.5-1.el5.src.rpmb0ca78a928ec32f6194d15ee91107aa90bc7d6e1e661dc37e5914ffc4b0ae481-el5_u2_x86_64_patch
kernel-2.6.18-92.1.17.0.1.el5.x86_64.rpmc352e0ac81737078792854418e10d5c726d1133678baeb918391d8aaaf2d052eELSA-2019-4732el5_u2_x86_64_patch
kernel-debug-2.6.18-92.1.17.0.1.el5.x86_64.rpmb41403cf58c35bd58ae6e884243fd427dac5d762f5b9debad9ebeaa0201da4eaELSA-2019-4732el5_u2_x86_64_patch
kernel-debug-devel-2.6.18-92.1.17.0.1.el5.x86_64.rpm46ba010581bc66be6356badcd48abf8cfd5d6ca886aa4053ccb16eeeae72cfadELSA-2019-4732el5_u2_x86_64_patch
kernel-devel-2.6.18-92.1.17.0.1.el5.x86_64.rpm7d4accb3a76a9b25057b8473fc676f64c691e70e3b9ba1035fd9c6f9fea24f1aELSA-2019-4732el5_u2_x86_64_patch
kernel-doc-2.6.18-92.1.17.0.1.el5.noarch.rpm9ea77e069a35740d2fa03728ea06e057999211cd903e22ccea66572f2176ff74ELSA-2019-4732el5_u2_x86_64_patch
kernel-headers-2.6.18-92.1.17.0.1.el5.x86_64.rpmc1704c98726cab6a43957461dc24fec760c7ddd800796666b64ad3e7df2d1067ELSA-2019-4732el5_u2_x86_64_patch
kernel-xen-2.6.18-92.1.17.0.1.el5.x86_64.rpmad1c2d104ab100c9c70a130be78b3916de9767f7b967d2475722ff0b374028b0ELSA-2019-4732el5_u2_x86_64_patch
kernel-xen-devel-2.6.18-92.1.17.0.1.el5.x86_64.rpm1cb36e6d8f8be639ed68ecaad7d93ae6231c25a8b9e7e0a60c8ee8f91c7e56e2ELSA-2019-4732el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.17.0.1.el5-1.2.9-1.el5.x86_64.rpma9a0324d41b2416315d0f986b86799c6b0b5ce5a4ea5589ff331d3963093019a-el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.17.0.1.el5debug-1.2.9-1.el5.x86_64.rpmbef349fa7611c5fc533a1ffac3ac7ffb55d3b006346dcb0baa65bf353f6ba9c8-el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.17.0.1.el5xen-1.2.9-1.el5.x86_64.rpm7e000daa3549274700695fc3ff5686db511737c6576bedff048f202fb61b9e6c-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.17.0.1.el5-2.0.5-1.el5.x86_64.rpmc671c3709f0575be277723e1fc1f9c623dc7fd14f8d6387dde51609655169d79-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.17.0.1.el5debug-2.0.5-1.el5.x86_64.rpma647fa0770a59e7677ff5ea49883965b3c41387c35f07e159f99465d5ad59bd1-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.17.0.1.el5xen-2.0.5-1.el5.x86_64.rpm1514472e969ca01241346b79435ae6262637460330acc8979e81c4a17be5003d-el5_u2_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete