ELSA-2010-0046

ELSA-2010-0046 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2010-01-20

Description



[2.6.18-164.11.1.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change
(Chuck Anderson) [orabug 7556514]
- Add entropy support to igb ( John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina yang) [orabug 6993043]
[bz 7258]
- [MM] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)
[orabug 7579314]
- FP register state is corrupted during the handling a SIGSEGV (Chuck Anderson)
[orabug 7708133]

[2.6.18-164.11.1.el5]
- [firewire] ohci: handle receive packets with zero data (Jay Fenlason) [547241 547242] {CVE-2009-4138}
- [x86] sanity check for AMD northbridges (Andrew Jones) [549905 547518]
- [x86_64] disable vsyscall in kvm guests (Glauber Costa) [550968 542612]
- [fs] ext3: replace lock_super with explicit resize lock (Eric Sandeen) [549908 525100]
- [fs] respect flag in do_coredump (Danny Feng) [544188 544189] {CVE-2009-4036}
- [gfs2] make O_APPEND behave as expected (Steven Whitehouse) [547521 544342]
- [fs] hfs: fix a potential buffer overflow (Amerigo Wang) [540740 540741] {CVE-2009-4020}
- [fuse] prevent fuse_put_request on invalid pointer (Danny Feng) [538736 538737] {CVE-2009-4021}
- [mm] call vfs_check_frozen after unlocking the spinlock (Amerigo Wang) [548370 541956]
- [infiniband] init neigh->dgid.raw on bonding events (Doug Ledford) [543448 538067]
- [scsi] gdth: prevent negative offsets in ioctl (Amerigo Wang) [539420 539421] {CVE-2009-3080}
- [fs] gfs2: fix glock ref count issues (Steven Whitehouse) [544978 539240]
- [net] call cond_resched in rt_run_flush (Amerigo Wang) [547530 517588]
- [scsi] megaraid: fix sas permissions in sysfs (Casey Dahlin) [537312 537313] {CVE-2009-3889 CVE-2009-3939}
- [ia64] kdump: restore registers in the stack on init (Takao Indoh ) [542582 515753]
- [x86] kvm: don't ask HV for tsc khz if not using kvmclock (Glauber Costa ) [537027 531268]
- [net] sched: fix panic in bnx2_poll_work (John Feeney ) [539686 526481]
- [x86_64] fix 32-bit process register leak (Amerigo Wang ) [526797 526798]
- [cpufreq] add option to avoid smi while calibrating (Matthew Garrett ) [537343 513649]
- [kvm] use upstream kvm_get_tsc_khz (Glauber Costa ) [540896 531025]
- [net] fix unbalance rtnl locking in rt_secret_reschedule (Neil Horman ) [549907 510067]
- [net] r8169: imporved rx length check errors (Neil Horman ) [552913 552438]
- [scsi] lpfc: fix FC ports offlined during target controller faults (Rob Evers ) [549906 516541]
- [net] emergency route cache flushing fixes (Thomas Graf ) [545662 545663] {CVE-2009-4272}
- [fs] fasync: split 'fasync_helper()' into separate add/remove functions (Danny Feng ) [548656 548657] {CVE-2009-4141}
- [scsi] qla2xxx: NPIV vport management pseudofiles are world writable (Tom Coughlan ) [537317 537318] {CVE-2009-3556}


Related CVEs


CVE-2009-3080
CVE-2009-4020
CVE-2009-3889
CVE-2009-3939
CVE-2009-4021
CVE-2009-4141
CVE-2009-4272
CVE-2006-6304
CVE-2009-2910
CVE-2009-4138
CVE-2009-3556

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-164.11.1.0.1.el5.src.rpmf00c13a45d8e1a824c805c4c43f01e05bff1eae39be4e8ff3fcf2c6adff1a41eELSA-2019-4732el5_u4_i386_patch
ocfs2-2.6.18-164.11.1.0.1.el5-1.4.4-1.el5.src.rpmbc1f02c3ee7c2c1680ffe3765be8904df55fd1fcadef68348e9b7874cdd418ce-el5_u4_i386_patch
oracleasm-2.6.18-164.11.1.0.1.el5-2.0.5-1.el5.src.rpm138dfc6606b894001e1536a09f16bfc2978412d5f4eec87c92441dd5fa7583c2-el5_u4_i386_patch
kernel-2.6.18-164.11.1.0.1.el5.i686.rpm9f3da26042d16d88b05f51ad73ab0ee8502cef75b608475c35bfc35a6c90b808ELSA-2019-4732el5_u4_i386_patch
kernel-PAE-2.6.18-164.11.1.0.1.el5.i686.rpm99ebf39dea9966c606d85b7d93fbbea975378281b01785f4a7927793d3443558ELSA-2019-4732el5_u4_i386_patch
kernel-PAE-devel-2.6.18-164.11.1.0.1.el5.i686.rpm7e46439b524abfecfabae25a22e06cc2e57a7c5badb7e0c8260585c09e48d18eELSA-2019-4732el5_u4_i386_patch
kernel-debug-2.6.18-164.11.1.0.1.el5.i686.rpmd20a0f0cc1cca441e3af18b6a16de5e446ed489ecae6bf90e330c328ef6f11a3ELSA-2019-4732el5_u4_i386_patch
kernel-debug-devel-2.6.18-164.11.1.0.1.el5.i686.rpm5414a63a26086fd377e539159d21c68be84c4a29fa63eb716e99dbb0391da41bELSA-2019-4732el5_u4_i386_patch
kernel-devel-2.6.18-164.11.1.0.1.el5.i686.rpm4fc993edd8ea1cbbdde4f3e263e676d018f605a8a1bb077754749271b015dba7ELSA-2019-4732el5_u4_i386_patch
kernel-doc-2.6.18-164.11.1.0.1.el5.noarch.rpm32e7bb22b047659b8ff41e76ff1247eb60c4cb7fd9cf355f31c3d5cd5f7b04f0ELSA-2019-4732el5_u4_i386_patch
kernel-headers-2.6.18-164.11.1.0.1.el5.i386.rpm386692bf48740d1d5334ad9d8d4807b7e0b7d4e6193c1c01c2112de6c11d79a1ELSA-2019-4732el5_u4_i386_patch
kernel-xen-2.6.18-164.11.1.0.1.el5.i686.rpm9b1e7c8ff762f260fbfd81b6d76acb05c149e41806eea2965223703aa0cbc727ELSA-2019-4732el5_u4_i386_patch
kernel-xen-devel-2.6.18-164.11.1.0.1.el5.i686.rpm2cb52785062b3025c0dc69ad5a776baaa86919d90b4fce3569bad6befcd8670fELSA-2019-4732el5_u4_i386_patch
ocfs2-2.6.18-164.11.1.0.1.el5-1.4.4-1.el5.i686.rpm50b64b0144967c77375714e6db13b61121e7aebe0aea23211e18e0822a28c293-el5_u4_i386_patch
ocfs2-2.6.18-164.11.1.0.1.el5PAE-1.4.4-1.el5.i686.rpm59f1bb4bf6725782d63227c9d75b9c184b4b38148e2ac8761157372f0e27a796-el5_u4_i386_patch
ocfs2-2.6.18-164.11.1.0.1.el5debug-1.4.4-1.el5.i686.rpm9548bf58b21262a8be6edea890522af0d73fe1cfeb147ba96b364040a6b27d96-el5_u4_i386_patch
ocfs2-2.6.18-164.11.1.0.1.el5xen-1.4.4-1.el5.i686.rpm15108f2596decd6b0af7560a3d5174193cfed3c0426005fe4ae829db67a72498-el5_u4_i386_patch
oracleasm-2.6.18-164.11.1.0.1.el5-2.0.5-1.el5.i686.rpm2dd3977aa1a0254ec05f9deae0f50c3e327d2dc3e4c4821a8836296206ca9655-el5_u4_i386_patch
oracleasm-2.6.18-164.11.1.0.1.el5PAE-2.0.5-1.el5.i686.rpmf6349c3530721c142e9b2d6d0ee28bb553755f5fa59cf890ef2edf1ae9755b29-el5_u4_i386_patch
oracleasm-2.6.18-164.11.1.0.1.el5debug-2.0.5-1.el5.i686.rpmd6fa638c734132065caed4e55a8c50a8aa7bb26f09222dfa519439f5a8a09a85-el5_u4_i386_patch
oracleasm-2.6.18-164.11.1.0.1.el5xen-2.0.5-1.el5.i686.rpmc744a731b44edbdb534b7dbcff30c40bb46b2c14847cd06d024b78f52da1d64d-el5_u4_i386_patch
Oracle Linux 5 (ia64) kernel-2.6.18-164.11.1.0.1.el5.src.rpmf00c13a45d8e1a824c805c4c43f01e05bff1eae39be4e8ff3fcf2c6adff1a41eELSA-2019-4732el5_u4_ia64_patch
ocfs2-2.6.18-164.11.1.0.1.el5-1.4.4-1.el5.src.rpmbc1f02c3ee7c2c1680ffe3765be8904df55fd1fcadef68348e9b7874cdd418ce-el5_u4_ia64_patch
oracleasm-2.6.18-164.11.1.0.1.el5-2.0.5-1.el5.src.rpm138dfc6606b894001e1536a09f16bfc2978412d5f4eec87c92441dd5fa7583c2-el5_u4_ia64_patch
kernel-2.6.18-164.11.1.0.1.el5.ia64.rpm36e451cd8f512df080fcd06566192ca0b2978f3aa8988e623c8184e32a28247fELSA-2019-4732el5_u4_ia64_patch
kernel-debug-2.6.18-164.11.1.0.1.el5.ia64.rpmc8017d8e13a0f72f24b40e5510d348194133b5601a8ff1c469e67826b04f1171ELSA-2019-4732el5_u4_ia64_patch
kernel-debug-devel-2.6.18-164.11.1.0.1.el5.ia64.rpmb9ead333eac35da6075da3640074052f7824b7d66a0320bce0deb81f6405f27dELSA-2019-4732el5_u4_ia64_patch
kernel-devel-2.6.18-164.11.1.0.1.el5.ia64.rpmcf52dc486868c47965823120466a59ed2892f56b9e08f72972b2dbf984f5efafELSA-2019-4732el5_u4_ia64_patch
kernel-doc-2.6.18-164.11.1.0.1.el5.noarch.rpm32e7bb22b047659b8ff41e76ff1247eb60c4cb7fd9cf355f31c3d5cd5f7b04f0ELSA-2019-4732el5_u4_ia64_patch
kernel-headers-2.6.18-164.11.1.0.1.el5.ia64.rpm2ec389741091978afd7b8df4507922eccdae213df037a38bd4d8fd521a08906dELSA-2019-4732el5_u4_ia64_patch
kernel-xen-2.6.18-164.11.1.0.1.el5.ia64.rpm8274571834d1f5cd15bc7c598bb2892bcf8a1b586909c05d500f86847eb221faELSA-2019-4732el5_u4_ia64_patch
kernel-xen-devel-2.6.18-164.11.1.0.1.el5.ia64.rpmb0947ed02af2b78ac1d6622c88e56f935ce1c182a250d77f36d952cc933ac7c3ELSA-2019-4732el5_u4_ia64_patch
ocfs2-2.6.18-164.11.1.0.1.el5-1.4.4-1.el5.ia64.rpm894e9da22c313fdb60d259564033be259bacdbae71e8df0002ebe17921f5aa90-el5_u4_ia64_patch
ocfs2-2.6.18-164.11.1.0.1.el5debug-1.4.4-1.el5.ia64.rpm06f06a9cedcc2f2a3f371d6bea9acdcbc7f8c08ca2be5932a7c7d3c5da18ada2-el5_u4_ia64_patch
ocfs2-2.6.18-164.11.1.0.1.el5xen-1.4.4-1.el5.ia64.rpmd5669e8d94d5282f42bc00598dc997bacb02aa5afda44a5628257521e673bcdd-el5_u4_ia64_patch
oracleasm-2.6.18-164.11.1.0.1.el5-2.0.5-1.el5.ia64.rpm4bf864a58faebb45befce0429de495017e524888992ab4f9b0e4b25586e8c7a7-el5_u4_ia64_patch
oracleasm-2.6.18-164.11.1.0.1.el5debug-2.0.5-1.el5.ia64.rpmfd40b0bb5eb68df4b8fac52eddd74e1803e23231697024f92b35dedc9e7c30b4-el5_u4_ia64_patch
oracleasm-2.6.18-164.11.1.0.1.el5xen-2.0.5-1.el5.ia64.rpm771637cbef73788f12f439a56fba24aaf7bd996be7b758c5796fb53ea8efb225-el5_u4_ia64_patch
Oracle Linux 5 (x86_64) kernel-2.6.18-164.11.1.0.1.el5.src.rpmf00c13a45d8e1a824c805c4c43f01e05bff1eae39be4e8ff3fcf2c6adff1a41eELSA-2019-4732el5_u4_x86_64_patch
ocfs2-2.6.18-164.11.1.0.1.el5-1.4.4-1.el5.src.rpmbc1f02c3ee7c2c1680ffe3765be8904df55fd1fcadef68348e9b7874cdd418ce-el5_u4_x86_64_patch
oracleasm-2.6.18-164.11.1.0.1.el5-2.0.5-1.el5.src.rpm138dfc6606b894001e1536a09f16bfc2978412d5f4eec87c92441dd5fa7583c2-el5_u4_x86_64_patch
kernel-2.6.18-164.11.1.0.1.el5.x86_64.rpmce5e11ea67b869330be4fe4245b548a336aaaba0a132578968e21eb68aa16bf7ELSA-2019-4732el5_u4_x86_64_patch
kernel-debug-2.6.18-164.11.1.0.1.el5.x86_64.rpmb75a80aaff0b5443c0d2eebffac146db04608d95e09b93368d6ea233c664f9efELSA-2019-4732el5_u4_x86_64_patch
kernel-debug-devel-2.6.18-164.11.1.0.1.el5.x86_64.rpm6866e493403c43028a55e6b4ff7cd34ff0e191acc9202db0823be7088c5e3b75ELSA-2019-4732el5_u4_x86_64_patch
kernel-devel-2.6.18-164.11.1.0.1.el5.x86_64.rpmf5067eeede2f7fd656d3d8938fa598fddca751b3bfe89fcd729fa4bdcdfcc36bELSA-2019-4732el5_u4_x86_64_patch
kernel-doc-2.6.18-164.11.1.0.1.el5.noarch.rpm32e7bb22b047659b8ff41e76ff1247eb60c4cb7fd9cf355f31c3d5cd5f7b04f0ELSA-2019-4732el5_u4_x86_64_patch
kernel-headers-2.6.18-164.11.1.0.1.el5.x86_64.rpm9188636914c7389e397d6e443549a5cde5f121a9d090e4ef98d2350ad531d011ELSA-2019-4732el5_u4_x86_64_patch
kernel-xen-2.6.18-164.11.1.0.1.el5.x86_64.rpmd62d559ca2a5df7a707157058d52c87578433c5fbe1db188f734443181eff38dELSA-2019-4732el5_u4_x86_64_patch
kernel-xen-devel-2.6.18-164.11.1.0.1.el5.x86_64.rpm9327d31dc3e66a336bf4cabe4ba358e3175378f89251e0d969fa722702667c9bELSA-2019-4732el5_u4_x86_64_patch
ocfs2-2.6.18-164.11.1.0.1.el5-1.4.4-1.el5.x86_64.rpmfd8ea4d6ce85692e1daf0839697c41cc19040777488aa74ed4c968f17f788ef1-el5_u4_x86_64_patch
ocfs2-2.6.18-164.11.1.0.1.el5debug-1.4.4-1.el5.x86_64.rpm4e4051fb48e29733b93ef3c7d6f4b49fc7c32853d3b9a578f835f0bae809b9f7-el5_u4_x86_64_patch
ocfs2-2.6.18-164.11.1.0.1.el5xen-1.4.4-1.el5.x86_64.rpm66adf6505678b478d40f0f0860b0a4162b8d2f00e85694f98a36fbe6d6a0fc8a-el5_u4_x86_64_patch
oracleasm-2.6.18-164.11.1.0.1.el5-2.0.5-1.el5.x86_64.rpm46ad395525c3d3628ad60914cfbf00843fe44fbd4a24931e7176d0876d9b79ca-el5_u4_x86_64_patch
oracleasm-2.6.18-164.11.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpmfb50a2f6e9b463800f094880248e96bea524d1dfd4f958b1e971f8a2491c2198-el5_u4_x86_64_patch
oracleasm-2.6.18-164.11.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpma0fe399d76c754b60b895f55a9b6c236247525d742d8aed39246666de16171cf-el5_u4_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete