ELSA-2008-1017

ELSA-2008-1017 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2008-12-17

Description


[2.6.18-92.1.22.0.1.el5]
- [net] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [net] Add xen pv/bonding netconsole support (Tina yang) [orabug 6993043] [bz 7258]
- [mm] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- [nfs] nfs attribute timeout fix (Trond Myklebust) [orabug 7156607] [RHBZ 446083]
- [xen] execshield: fix endless GPF fault loop (Stephen Tweedie) [orabug 7175395]

[2.6.18-92.1.22.el5]
- [misc] hugepages: ia64 stack overflow and corrupt memory (Larry Woodman ) [474347 472802]
- [misc] allow hugepage allocation to use most of memory (Larry Woodman ) [474760 438889]

[2.6.18-92.1.21.el5]
- [misc] rtc: disable SIGIO notification on close (Vitaly Mayatskikh ) [465746 465747]

[2.6.18-92.1.20.el5]
- [input] atkbd: cancel delayed work before freeing struct (Jiri Pirko ) [461232 461233]
- [drm] i915 driver arbitrary ioremap (Eugene Teo ) [464508 464509] {CVE-2008-3831}
- [fs] don't allow splice to files opened with O_APPEND (Eugene Teo ) [466709 466710] {CVE-2008-4554}
- [xen] x86: allow the kernel to boot on pre-64 bit hw (Chris Lalancette ) [470040 468083]
- [net] ipv4: fix byte value boundary check (Jiri Pirko ) [469649 468148]
- [ia64] fix ptrace hangs when following threads (Denys Vlasenko ) [469150 461456]
- [net] sctp: INIT-ACK indicates no AUTH peer support oops (Eugene Teo ) [466081 466082] {CVE-2008-4576}
- [input] atkbd: delay executing of LED switching request (Jiri Pirko ) [461232 461233]
- [xen] ia64: make viosapic SMP-safe by adding lock/unlock (Tetsu Yamamoto ) [467727 466552]
- [xen] allow guests to hide the TSC from applications (Chris Lalancette ) [378471 378481] {CVE-2007-5907}
- [nfs] v4: don't reuse expired nfs4_state_owner structs (Jeff Layton ) [469650 441884]
- [nfs] v4: credential ref leak in nfs4_get_state_owner (Jeff Layton ) [469650 441884]
- [nfs] v4: Poll aggressively when handling NFS4ERR_DELAY (Jeff Layton ) [469650 441884]
- [xen] ia64: speed up hypercall for guest domain creation (Tetsu Yamamoto ) [459080 456171]
- [xen] use unlocked_ioctl in evtchn, gntdev and privcmd (Tetsu Yamamoto ) [459080 456171]
- [xen] page scrub: serialise softirq with a new lock (Tetsu Yamamoto ) [459080 456171]
- [xen] serialize scrubbing pages (Tetsu Yamamoto ) [459080 456171]
- [nfs] pages of a memory mapped file get corrupted (Peter Staubach ) [450335 435291]
- [x86_64] xen: fix syscall return when tracing (Chris Lalancette ) [470853 453394]

[2.6.18-92.1.19.el5]
- Revert: [xen] allow guests to hide the TSC from applications (Chris Lalancette ) [378471 378481] {CVE-2007-5907}
- Revert: [xen] x86: allow the kernel to boot on pre-64 bit hw (Chris Lalancette ) [470040 468083]

[2.6.18-92.1.18.el5]
- [xen] x86: allow the kernel to boot on pre-64 bit hw (Chris Lalancette ) [470040 468083]


Related CVEs


CVE-2008-3831
CVE-2008-4554
CVE-2008-4576

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-92.1.22.0.1.el5.src.rpma1f071798f21dc3369feff3f04f0dcb1cf8642841aaec8dc62620bcd20d8841dELSA-2019-4732el5_u2_i386_patch
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.src.rpm33e2e709a30e0df20d4e7f991b08a00a58084bf4d0903cdc693e9d5543393b9f-el5_u2_i386_patch
ofa-2.6.18-92.1.22.0.1.el5-1.3.1-5.20080603.src.rpm6f703e9b71e30364f617527822881f80c5f7cbfdcc5ea3fd9231a0d2fe164324-el5_rds_i386_latest
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.src.rpma179f7257d1e9fc9c230f51f0eacbacb4d7995c006cb90da77d1180a4e0d62df-el5_u2_i386_patch
kernel-2.6.18-92.1.22.0.1.el5.i686.rpmbf1e8681cc91de77814c16c6904232d879305f8bb79fd8a08b00291605c7389bELSA-2019-4732el5_u2_i386_patch
kernel-PAE-2.6.18-92.1.22.0.1.el5.i686.rpm6ddd627fb64c6fde924b5d05ea8a75e389db2dc18165e026e5f9a557c96372c2ELSA-2019-4732el5_u2_i386_patch
kernel-PAE-devel-2.6.18-92.1.22.0.1.el5.i686.rpm9a335a223b79ccdf00c146bacdcb5bb5bc8b6eca643f4cf02420fecc4e6af65eELSA-2019-4732el5_u2_i386_patch
kernel-debug-2.6.18-92.1.22.0.1.el5.i686.rpma64d589da1fd4fbc06e837826d51cbfe186846ff31827ecea37101a3470aed65ELSA-2019-4732el5_u2_i386_patch
kernel-debug-devel-2.6.18-92.1.22.0.1.el5.i686.rpmf87b29686b5bb947ee17a773c89f8db03febd1bf1e881af723e5022368a22d23ELSA-2019-4732el5_u2_i386_patch
kernel-devel-2.6.18-92.1.22.0.1.el5.i686.rpmf78a3ae456be744a0fbca372fb3d95b110da1b4a48f98b99966da469e865c462ELSA-2019-4732el5_u2_i386_patch
kernel-doc-2.6.18-92.1.22.0.1.el5.noarch.rpm0a0f5e0c84b791b582e36e59dc5824076fdb585fe1da82c9e81b56a509181837ELSA-2019-4732el5_u2_i386_patch
kernel-headers-2.6.18-92.1.22.0.1.el5.i386.rpm0bc095be163634f033e5933b6272acf7f6f3409d3e53d01cf1985f798aba4252ELSA-2019-4732el5_u2_i386_patch
kernel-xen-2.6.18-92.1.22.0.1.el5.i686.rpmcba3e7c68c81e00e6b979bb65b0554b07ede0321db68fa3c2ec2a660bd2eb60bELSA-2019-4732el5_u2_i386_patch
kernel-xen-devel-2.6.18-92.1.22.0.1.el5.i686.rpm41b5f0f91c8df81c70155460111001fd36a6e9deb40ca6f14e8c0bdbfd991374ELSA-2019-4732el5_u2_i386_patch
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.i686.rpm9a0ef7fb5c53bd4afaf4c446bacd8dbb49c26dbcf401f50538f0d168044fc9a9-el5_u2_i386_patch
ocfs2-2.6.18-92.1.22.0.1.el5PAE-1.2.9-1.el5.i686.rpm2e50f3f78efcaf7b11995bb528e0a0c3d76199f6145d81cd007ec227e33d2774-el5_u2_i386_patch
ocfs2-2.6.18-92.1.22.0.1.el5debug-1.2.9-1.el5.i686.rpm0afa709efbdf2bf91297d71afb3fa7b836412379dc04c5b662f8f1f64d45df57-el5_u2_i386_patch
ocfs2-2.6.18-92.1.22.0.1.el5xen-1.2.9-1.el5.i686.rpmb426ae79eb3a6515dc82f89f619d5865621367dd173eb61920e8b048f2603955-el5_u2_i386_patch
ofa-2.6.18-92.1.22.0.1.el5-1.3.1-5.20080603.i686.rpm2def9c83b9673abf1d10b2dc1a20f2d104e9bc5341359b54314638c91a1def05-el5_rds_i386_latest
ofa-2.6.18-92.1.22.0.1.el5PAE-1.3.1-5.20080603.i686.rpm80fd11b92072a067fb937766e90e1f436792aae6d9736b35a6c61533059f870f-el5_rds_i386_latest
ofa-2.6.18-92.1.22.0.1.el5xen-1.3.1-5.20080603.i686.rpmd7937217a43455987485bd90bdfbe6d729f139b0e1fe9b56de14661f35de3543-el5_rds_i386_latest
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.i686.rpmd0aadd2c02321aba68cbfeede0ea67e171a175831f68b9c390d7000724af9d55-el5_u2_i386_patch
oracleasm-2.6.18-92.1.22.0.1.el5PAE-2.0.5-1.el5.i686.rpm2b42e71e9aebd0017dbb03bd27e99aeef0394b91f24d27416f71cc28cab2f3c4-el5_u2_i386_patch
oracleasm-2.6.18-92.1.22.0.1.el5debug-2.0.5-1.el5.i686.rpmcf73773d373595d37a384fb882156c22dc96963286593fed997d2fb37b9f552f-el5_u2_i386_patch
oracleasm-2.6.18-92.1.22.0.1.el5xen-2.0.5-1.el5.i686.rpmccf7940ed0815c09dfe8f32574a30790d068ac015a9932594de8a3e27dc9d316-el5_u2_i386_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-92.1.22.0.1.el5.src.rpma1f071798f21dc3369feff3f04f0dcb1cf8642841aaec8dc62620bcd20d8841dELSA-2019-4732el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.src.rpm33e2e709a30e0df20d4e7f991b08a00a58084bf4d0903cdc693e9d5543393b9f-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.src.rpma179f7257d1e9fc9c230f51f0eacbacb4d7995c006cb90da77d1180a4e0d62df-el5_u2_x86_64_patch
kernel-2.6.18-92.1.22.0.1.el5.x86_64.rpmfdfdb688d0de2f55ef4344098569f80f37d00b49ec675db88f0017e880a344e2ELSA-2019-4732el5_u2_x86_64_patch
kernel-debug-2.6.18-92.1.22.0.1.el5.x86_64.rpm454731213de1e6ec7665f07e8e53f01a6e82bc7d960d3335a4ad10d291424fc6ELSA-2019-4732el5_u2_x86_64_patch
kernel-debug-devel-2.6.18-92.1.22.0.1.el5.x86_64.rpmcc38f6eb7dfe119f40712ac30535916f0efede337383a4ac2b1da9929ebb1ea6ELSA-2019-4732el5_u2_x86_64_patch
kernel-devel-2.6.18-92.1.22.0.1.el5.x86_64.rpm2c869ef63b5cd458497a6c7ea939c4d75450ac61775d436825f954e15abd4105ELSA-2019-4732el5_u2_x86_64_patch
kernel-doc-2.6.18-92.1.22.0.1.el5.noarch.rpm0a0f5e0c84b791b582e36e59dc5824076fdb585fe1da82c9e81b56a509181837ELSA-2019-4732el5_u2_x86_64_patch
kernel-headers-2.6.18-92.1.22.0.1.el5.x86_64.rpmbe8fbfb66f99d874a0039b75c7c3016b4a657c4e823cbe32bfe6dcd19d1de4a7ELSA-2019-4732el5_u2_x86_64_patch
kernel-xen-2.6.18-92.1.22.0.1.el5.x86_64.rpma6516e92a33ea12030e171ddff81dd3b606f891c2e1ee0df0dfd949d0e0865d2ELSA-2019-4732el5_u2_x86_64_patch
kernel-xen-devel-2.6.18-92.1.22.0.1.el5.x86_64.rpm58877179a4662fa42d0e6d9f98195f2c06908f28d1014959e38608551b1eccceELSA-2019-4732el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.22.0.1.el5-1.2.9-1.el5.x86_64.rpmefe79f7209394a312dd4c73aed828ab1af03661f0fef82b1497da8951dcadfb1-el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.22.0.1.el5debug-1.2.9-1.el5.x86_64.rpm07e496578fe395b835c5265155548ead67dce34467146364949c9ab95b535844-el5_u2_x86_64_patch
ocfs2-2.6.18-92.1.22.0.1.el5xen-1.2.9-1.el5.x86_64.rpm94452430c6065bc0aff9f43b1afad5811776f49492be4a525ca82d441f5c5bc0-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.22.0.1.el5-2.0.5-1.el5.x86_64.rpm0ae21012ba104196c32ee5bc9e53f7fd63c5afe1efb0284254158dd81956ee6f-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.22.0.1.el5debug-2.0.5-1.el5.x86_64.rpm86f53d835905548281a659863fe5c2b444050d9231e29e761409122e2bc7fc31-el5_u2_x86_64_patch
oracleasm-2.6.18-92.1.22.0.1.el5xen-2.0.5-1.el5.x86_64.rpm3f374835a4b595f7efc04e9dd86bc4408ba28d62cdcd7d21ece27d0100b1c11b-el5_u2_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete