ELSA-2009-1548

ELSA-2009-1548 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2009-11-03

Description



[2.6.18-164.6.1.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
- Add entropy support to igb ( John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina yang) [orabug 6993043] [bz 7258]
- [MM] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang) [orabug 7579314]

[2.6.18-164.6.1.el5]
- [fs] fix pipe null pointer dereference (Jeff Moyer) [530938 530939] {CVE-2009-3547}
- [security] require root for mmap_min_addr (Eric Paris ) [518142 518143] {CVE-2009-2695}
- [net] lvs: adjust sync protocol handling for ipvsadm -2 (Neil Horman ) [528645 524129]
- [xen] allow booting with broken serial hardware (Chris Lalancette ) [524153 518338]

[2.6.18-164.5.1.el5]
- [fs] eCryptfs: prevent lower dentry from going negative (Eric Sandeen ) [527834 527835] {CVE-2009-2908}
- [nfs] v4: reclaimer thread stuck in an infinite loop (Sachin S. Prabhu ) [529162 526888]
- [net] r8169: avoid losing MSI interrupts (Ivan Vecera ) [529366 514589]
- [scsi] st.c: memory use after free after MTSETBLK ioctl (David Jeffery ) [528133 520192]
- [net] r8169: balance pci_map/unmap pair, use hw padding (Ivan Vecera ) [529143 515857] {CVE-2009-3613}

[2.6.18-164.4.1.el5]
- [net] bonding: set primary param via sysfs (Jiri Pirko ) [517971 499884]
- [scsi] fusion: re-enable mpt_msi_enable option (Tomas Henzl ) [526963 520820]
- [net] ipt_recent: sanity check hit count (Amerigo Wang ) [527434 523982]
- [net] ipv4: ip_append_data handle NULL routing table (Jiri Pirko ) [527436 520297]
- [nfs] fix cache invalidation problems in nfs_readdir (Jeff Layton ) [526960 511170]
- [net] tc: fix unitialized kernel memory leak (Jiri Pirko ) [520994 520863]

[2.6.18-164.3.1.el5]
- [nfs] knfsd: fix NFSv4 O_EXCL creates (Jeff Layton ) [522163 524521] {CVE-2009-3286}


Related CVEs


CVE-2009-2908
CVE-2009-3286
CVE-2009-3547
CVE-2009-3613
CVE-2009-2695
CVE-2009-3228

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-164.6.1.0.1.el5.src.rpmf04ab2147d2ee6a441dabc3ccbce9e5de90165165232d2a4e4bfc7db06595ffeELSA-2019-4732el5_u4_i386_patch
ocfs2-2.6.18-164.6.1.0.1.el5-1.4.4-1.el5.src.rpm64a23347f1f8cc6826197c8c48c6b8ee364ac58d57d10e11753c973fdc506f97-el5_u4_i386_patch
oracleasm-2.6.18-164.6.1.0.1.el5-2.0.5-1.el5.src.rpma894053ea6906790b22d49309192a12c20d6cadc61f1fbdbb674c928f2712fd1-el5_u4_i386_patch
kernel-2.6.18-164.6.1.0.1.el5.i686.rpm87d3082e702eb80e2802fd05ef9e3fa950c921b3d810b8d391ed931a9bd2e405ELSA-2019-4732el5_u4_i386_patch
kernel-PAE-2.6.18-164.6.1.0.1.el5.i686.rpm5cf4dcf9f9ea6e1986840d448edaaffd4fdf8ac70d2209673872518db75a9a6fELSA-2019-4732el5_u4_i386_patch
kernel-PAE-devel-2.6.18-164.6.1.0.1.el5.i686.rpmec74f0654116c4fa4e4b6a414283458dd03df067fda4a9e4ee814db6c1b43c03ELSA-2019-4732el5_u4_i386_patch
kernel-debug-2.6.18-164.6.1.0.1.el5.i686.rpmac192458cde215e87955330d592cbf37d53d3980c860f9e8ad2b5d0e2748fd20ELSA-2019-4732el5_u4_i386_patch
kernel-debug-devel-2.6.18-164.6.1.0.1.el5.i686.rpmf5247e27582ca4762697e9d3fb0dc4b9cb8547f557d01fdc807d163893bbbff2ELSA-2019-4732el5_u4_i386_patch
kernel-devel-2.6.18-164.6.1.0.1.el5.i686.rpmc1ccebdf9fe841a037251ec55fdf1be56cc8b504737b1340a7562548f3254dbaELSA-2019-4732el5_u4_i386_patch
kernel-doc-2.6.18-164.6.1.0.1.el5.noarch.rpm757b49dd6dbfaf393737a6f4a23e1c261b39c507c112ea4a6f00e158f45cd02eELSA-2019-4732el5_u4_i386_patch
kernel-headers-2.6.18-164.6.1.0.1.el5.i386.rpm657728a7525b5cfd63abe32725ffb50a10ec17cb1c9ff13abfad60186ad45649ELSA-2019-4732el5_u4_i386_patch
kernel-xen-2.6.18-164.6.1.0.1.el5.i686.rpmee0a303e858c612cfd2ee3999ab88d6bc2553b82ebf645adffda27e1349a5cd7ELSA-2019-4732el5_u4_i386_patch
kernel-xen-devel-2.6.18-164.6.1.0.1.el5.i686.rpmd0088d2698b5e8a68add9b274718c15fda21ccef6bb767b526aee33456fddbe5ELSA-2019-4732el5_u4_i386_patch
ocfs2-2.6.18-164.6.1.0.1.el5-1.4.4-1.el5.i686.rpm7ea3079887aa0a10db4a31db1aaa2e8c2bcfda3acc890b5b1b5f50ee22973702-el5_u4_i386_patch
ocfs2-2.6.18-164.6.1.0.1.el5PAE-1.4.4-1.el5.i686.rpm0bc45e8668fe58543939542832c8493f0218bda60f0a93be93bd35f81d1f6cdf-el5_u4_i386_patch
ocfs2-2.6.18-164.6.1.0.1.el5debug-1.4.4-1.el5.i686.rpm55a5974a42099b5c26def7a5e479d4a8887d49db12b9a5e456f8f4f89dbf9b6b-el5_u4_i386_patch
ocfs2-2.6.18-164.6.1.0.1.el5xen-1.4.4-1.el5.i686.rpm5de0c19e12fafd3f1c209b5b9d1cd42e2a6ddf9b4f7d17a50600850d9ae6a4b6-el5_u4_i386_patch
oracleasm-2.6.18-164.6.1.0.1.el5-2.0.5-1.el5.i686.rpm43cd97e0e22683b1545b316fb73ce66f913ae4b211672b6404aee222d470d73f-el5_u4_i386_patch
oracleasm-2.6.18-164.6.1.0.1.el5PAE-2.0.5-1.el5.i686.rpm81b647755229b8759c07d4e8bde7372a100a0300cbc89ddf42c55bb9beacd18f-el5_u4_i386_patch
oracleasm-2.6.18-164.6.1.0.1.el5debug-2.0.5-1.el5.i686.rpmf36feeef938326eeece6e23d9581af48dc0b0f0b206336719e38049d737d0a9f-el5_u4_i386_patch
oracleasm-2.6.18-164.6.1.0.1.el5xen-2.0.5-1.el5.i686.rpm78f78c6a21be88dbfee703ca5417b40cb248b65337de357bf8e0f6a64e957e2b-el5_u4_i386_patch
Oracle Linux 5 (ia64) kernel-2.6.18-164.6.1.0.1.el5.src.rpmf04ab2147d2ee6a441dabc3ccbce9e5de90165165232d2a4e4bfc7db06595ffeELSA-2019-4732el5_u4_ia64_patch
ocfs2-2.6.18-164.6.1.0.1.el5-1.4.4-1.el5.src.rpm64a23347f1f8cc6826197c8c48c6b8ee364ac58d57d10e11753c973fdc506f97-el5_u4_ia64_patch
oracleasm-2.6.18-164.6.1.0.1.el5-2.0.5-1.el5.src.rpma894053ea6906790b22d49309192a12c20d6cadc61f1fbdbb674c928f2712fd1-el5_u4_ia64_patch
kernel-2.6.18-164.6.1.0.1.el5.ia64.rpmf9fbc78dc9b278db592037abc035805b5783bbbf28644cb63f308c9106565216ELSA-2019-4732el5_u4_ia64_patch
kernel-debug-2.6.18-164.6.1.0.1.el5.ia64.rpmfa27f9c24a3d02251ed066daed667010fb1139bc9d31c7a1a0217f86e59642ebELSA-2019-4732el5_u4_ia64_patch
kernel-debug-devel-2.6.18-164.6.1.0.1.el5.ia64.rpm2fdfa52198e8e7539157271c5ceec5979922cfff66a391b4696d905823bec1b5ELSA-2019-4732el5_u4_ia64_patch
kernel-devel-2.6.18-164.6.1.0.1.el5.ia64.rpm069e06b612fcae007346862397582a236c72825aec049f2dbe54cf289309de8aELSA-2019-4732el5_u4_ia64_patch
kernel-doc-2.6.18-164.6.1.0.1.el5.noarch.rpm757b49dd6dbfaf393737a6f4a23e1c261b39c507c112ea4a6f00e158f45cd02eELSA-2019-4732el5_u4_ia64_patch
kernel-headers-2.6.18-164.6.1.0.1.el5.ia64.rpm09816023211dadc2dc41c0cda66d4640f6f28d8dd8efc1ce360749629a7043dcELSA-2019-4732el5_u4_ia64_patch
kernel-xen-2.6.18-164.6.1.0.1.el5.ia64.rpmfbe4e0efd38d356af6a11dc08f3189f9cc03a1662414db6c2b594df798fa1104ELSA-2019-4732el5_u4_ia64_patch
kernel-xen-devel-2.6.18-164.6.1.0.1.el5.ia64.rpm313daa1f782bbd8a99cadfe34ac02f9e5ff407b21d8994ab636bcc4b2536cf30ELSA-2019-4732el5_u4_ia64_patch
ocfs2-2.6.18-164.6.1.0.1.el5-1.4.4-1.el5.ia64.rpm59d1f10d23f7622aa7d332497997fb7729b6441ec00387016bf08aaa2e4a0072-el5_u4_ia64_patch
ocfs2-2.6.18-164.6.1.0.1.el5debug-1.4.4-1.el5.ia64.rpm56da1fe6d9fb50de041c54a0a502a88908426ae3467d90aced81bda64a79d22b-el5_u4_ia64_patch
ocfs2-2.6.18-164.6.1.0.1.el5xen-1.4.4-1.el5.ia64.rpm4fa75be63bf569151384b02007cc12ac681d54a153f9c17831edede46ae76aa5-el5_u4_ia64_patch
oracleasm-2.6.18-164.6.1.0.1.el5-2.0.5-1.el5.ia64.rpmf2d184df56be8e5930161e39eecba7e7ac2759158351a56efb0a49fdaad40c4a-el5_u4_ia64_patch
oracleasm-2.6.18-164.6.1.0.1.el5debug-2.0.5-1.el5.ia64.rpme9e568e859691e6e0c4e0ad4675f80400c9de5f8e692885edaa45287cd25e58c-el5_u4_ia64_patch
oracleasm-2.6.18-164.6.1.0.1.el5xen-2.0.5-1.el5.ia64.rpmb5f9ff1e47fccad21e80003e19665854cd6c6e53b2c55e1f44439ca02f7e96ab-el5_u4_ia64_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-164.6.1.0.1.el5.src.rpmf04ab2147d2ee6a441dabc3ccbce9e5de90165165232d2a4e4bfc7db06595ffeELSA-2019-4732el5_u4_x86_64_patch
ocfs2-2.6.18-164.6.1.0.1.el5-1.4.4-1.el5.src.rpm64a23347f1f8cc6826197c8c48c6b8ee364ac58d57d10e11753c973fdc506f97-el5_u4_x86_64_patch
oracleasm-2.6.18-164.6.1.0.1.el5-2.0.5-1.el5.src.rpma894053ea6906790b22d49309192a12c20d6cadc61f1fbdbb674c928f2712fd1-el5_u4_x86_64_patch
kernel-2.6.18-164.6.1.0.1.el5.x86_64.rpm2206d396c4d46ddf1e1e1454d88dbb2c571588405455431337bbe3da0ba17025ELSA-2019-4732el5_u4_x86_64_patch
kernel-debug-2.6.18-164.6.1.0.1.el5.x86_64.rpm4bab74f28ded79b9467a576ca23b885314a2283e27fe46bb4d52442d16ef4bb9ELSA-2019-4732el5_u4_x86_64_patch
kernel-debug-devel-2.6.18-164.6.1.0.1.el5.x86_64.rpm0358960fc76f936d9ade3e6975297fabae7cd6dc3fc3686de49791b7bfb18e0cELSA-2019-4732el5_u4_x86_64_patch
kernel-devel-2.6.18-164.6.1.0.1.el5.x86_64.rpmfdf2bae393203a2d46d234e0e6ee8fb05b8fcb3574b8508e2e688946b4bb747bELSA-2019-4732el5_u4_x86_64_patch
kernel-doc-2.6.18-164.6.1.0.1.el5.noarch.rpm757b49dd6dbfaf393737a6f4a23e1c261b39c507c112ea4a6f00e158f45cd02eELSA-2019-4732el5_u4_x86_64_patch
kernel-headers-2.6.18-164.6.1.0.1.el5.x86_64.rpm7a950a993cbd9373f389fa40c0b02dc3f9035b3a4996df164e80b3d53568a585ELSA-2019-4732el5_u4_x86_64_patch
kernel-xen-2.6.18-164.6.1.0.1.el5.x86_64.rpm90a299de66d38619fbea5237058900c6dcbb8feaf039279e1475e556b1cc6addELSA-2019-4732el5_u4_x86_64_patch
kernel-xen-devel-2.6.18-164.6.1.0.1.el5.x86_64.rpmed2047f8b7ab9198cda9593e9b002eaa2d12fe7f27330ab82d2122b08fe6874aELSA-2019-4732el5_u4_x86_64_patch
ocfs2-2.6.18-164.6.1.0.1.el5-1.4.4-1.el5.x86_64.rpmd6445eab5172f196c9a3d3e2e30541f0c9ad4b8781e28da996c6d5cb139b5d5c-el5_u4_x86_64_patch
ocfs2-2.6.18-164.6.1.0.1.el5debug-1.4.4-1.el5.x86_64.rpm4cb00c84351d47d8ac946d47bdbd3c05fc8b5a927d9049bf971647415b6fa24f-el5_u4_x86_64_patch
ocfs2-2.6.18-164.6.1.0.1.el5xen-1.4.4-1.el5.x86_64.rpm792a0eb3f99c1891ef9575a8eedd8463692be2aff14ad1494ebea7a3437de16a-el5_u4_x86_64_patch
oracleasm-2.6.18-164.6.1.0.1.el5-2.0.5-1.el5.x86_64.rpmc4d94ec6810f956f5609268129a8b38b06dcd8e9fa72599386afe651bcd58b8a-el5_u4_x86_64_patch
oracleasm-2.6.18-164.6.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm9e7d3041a54c1d8baf387582407c370644fee7a611f4c5d1c04bf504224a819a-el5_u4_x86_64_patch
oracleasm-2.6.18-164.6.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm8132244b1a056d2497eecfb2253b9f3c9d5eefe24b698d8a3d785b4d2761a4ef-el5_u4_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete