ELSA-2010-0504

ELSA-2010-0504 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2010-07-01

Description



[2.6.18-194.8.1.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change
(Chuck Anderson) [orabug 7556514]
- Add entropy support to igb (John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]
[bz 7258]
- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)
[orabug 7579314]
- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) [orabug 9504524]
- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]
RDS: Fix BUG_ONs to not fire when in a tasklet
ipoib: Fix lockup of the tx queue
RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)
RDS: Properly unmap when getting a remote access error (Tina Yang)
RDS: Fix locking in rds_send_drop_to()
- [mm] Enahance shrink_zone patch allow full swap utilization, and also be
NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)
[orabug 9245919]

[2.6.18-194.8.1.el5]
- [net] cnic: fix bnx2x panic w/multiple interfaces enabled (Stanislaw Gruszka) [607087 602402]

[2.6.18-194.7.1.el5]
- [virt] don't compute pvclock adjustments if we trust tsc (Glauber Costa) [601080 570824]
- [virt] add a global synchronization point for pvclock (Glauber Costa) [601080 570824]
- [virt] enable pvclock flags in vcpu_time_info structure (Glauber Costa) [601080 570824]
- [misc] add atomic64_cmpxcgh to x86_64 include files (Glauber Costa) [601080 570824]
- [x86] grab atomic64 types from upstream (Glauber Costa) [601080 570824]

[2.6.18-194.6.1.el5]
- [fs] gfs2: fix permissions checking for setflags ioctl (Steven Whitehouse) [595580 595399] {CVE-2010-1641}
- [mm] clear page errors when issuing a fresh read of page (Rik van Riel) [599739 590763]
- [misc] keys: do not find already freed keyrings (Vitaly Mayatskikh) [585099 585100] {CVE-2010-1437}
- [net] sctp: file must be valid before setting timeout (Jiri Pirko) [598355 578261]
- [net] tg3: fix panic in tg3_interrupt (John Feeney) [600498 569106]
- [net] e1000/e1000e: implement simple interrupt moderation (Andy Gospodarek) [599332 586416]
- [net] cnic: Fix crash during bnx2x MTU change (Stanislaw Gruszka) [596385 582367]
- [net] bxn2x: add dynamic lro disable support (Stanislaw Gruszka) [596385 582367]
- [net] implement dev_disable_lro api for RHEL5 (Stanislaw Gruszka) [596385 582367]
- [x86_64] fix time drift due to faulty lost tick tracking (Ulrich Obergfell) [601090 579711]
- [net] neigh: fix state transitions via Netlink request (Jiri Pirko) [600215 485903]
- [mm] fix hugepage corruption using vm.drop_caches (Larry Woodman) [599737 579469]
- [nfs] don't unhash dentry in nfs_lookup_revalidate (Jeff Layton) [596384 582321]
- [fs] remove unneccessary f_ep_lock from fasync_helper (Lachlan McIlroy) [599730 567479]
- [xen] set hypervisor present CPUID bit (Paolo Bonzini) [599734 573771]

[2.6.18-194.5.1.el5]
- [net] bonding: fix broken multicast with round-robin mode (Andy Gospodarek) [594057 570645]
- [net] tg3: fix INTx fallback when MSI fails (Steve Best) [592844 587666]
- [net] sched: fix SFQ qdisc crash w/limit of 2 packets (Jiri Pirko) [594054 579774]
- [nfs] revert retcode check in nfs_revalidate_mapping() (Jeff Layton) [594061 557423]
- [misc] futex: handle futex value corruption gracefully (Jerome Marchand) [563093 480396] {CVE-2010-0622}
- [misc] futex: handle user space corruption gracefully (Jerome Marchand) [563093 480396] {CVE-2010-0622}
- [misc] futex: fix fault handling in futex_lock_pi (Jerome Marchand) [563093 480396] {CVE-2010-0622}
- [net] e1000: fix WoL init when WoL disabled in EEPROM (Dean Nelson) [591493 568561]
- [virtio] fix GFP flags passed by virtio balloon driver (Amit Shah) [591611 584683]
- [net] sctp: fix skb_over_panic w/too many unknown params (Neil Horman) [584657 584658] {CVE-2010-1173}
- [acpi] fix WARN on unregister in power meter driver (Matthew Garrett) [592846 576246]
- [mm] keep get_unmapped_area_prot functional (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] switch do_brk to get_unmapped_area (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] take arch_mmap_check into get_unmapped_area (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] get rid of open-coding in ia64_brk (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] unify sys_mmap* functions (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] kill ancient cruft in s390 compat mmap (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] fix pgoff in have to relocate case of mremap (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] fix the arch checks in MREMAP_FIXED case (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] fix checks for expand-in-place mremap (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] add new vma_expandable helper function (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] move MREMAP_FIXED into its own header (Danny Feng) [556709 556710] {CVE-2010-0291}
- [mm] move locating vma code and checks on it (Danny Feng) [556709 556710] {CVE-2010-0291}

[2.6.18-194.4.1.el5]
- [acpi] warn on hot-add of memory exceeding 4G boundary (Prarit Bhargava) [587957 571544]
- [net] tipc: fix various oopses in uninitialized code (Neil Horman) [578058 558693] {CVE-2010-1187}
- [block] cfq-iosched: fix IOPRIO_CLASS_IDLE accounting (Jeff Moyer) [588219 574285]
- [block] cfq-iosched: async queue allocation per priority (Jeff Moyer) [588219 574285]
- [block] cfq-iosched: fix async queue behaviour (Jeff Moyer) [588219 574285]
- [block] cfq-iosched: propagate down request sync flag (Jeff Moyer) [588219 574285]
- [block] introduce the rq_is_sync macro (Jeff Moyer) [588219 574285]
- [fs] vfs: fix LOOKUP_FOLLOW on automount symlinks (Jeff Layton) [567815 567816] {CVE-2010-1088}
- [nfs] fix an oops when truncating a file (Jeff Layton) [567194 567195] {CVE-2010-1087}
- [fs] fix kernel oops while copying from ext3 to gfs2 (Abhijith Das) [586008 555754] {CVE-2010-1436}


Related CVEs


CVE-2010-1187
CVE-2010-1437
CVE-2010-1088
CVE-2010-0622
CVE-2010-1087
CVE-2010-1173
CVE-2010-1436
CVE-2010-1641
CVE-2010-0291

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-194.8.1.0.1.el5.src.rpmb071505cb8e47d1ee02cd65ae49e1b76c15136147bcef03945b12142c965238bELSA-2019-4732el5_u5_i386_patch
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.src.rpm8cdc9d0120315e1529ab2a550d85ab2fda970eb2cad95f035a29782a020ac934-el5_u5_i386_patch
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.src.rpm0d7ab4fa6f8efd53ae9de1b2b724e14cb0d709bb9a8e4948766fc346d4a0fc30-el5_u5_i386_patch
kernel-2.6.18-194.8.1.0.1.el5.i686.rpm0ad73ee5c9685bf5aa6c60210fa3ca685094bd51245a1bffba8c9c44115cd20bELSA-2019-4732el5_u5_i386_patch
kernel-PAE-2.6.18-194.8.1.0.1.el5.i686.rpm2d075d47f4c541c332c1c7708878814119ae2c06a5e458f433d9aea1a223521bELSA-2019-4732el5_u5_i386_patch
kernel-PAE-devel-2.6.18-194.8.1.0.1.el5.i686.rpm0e5c6a12198a0cc6310849e1fb72cc447b990cafe500be661c42f30d0a0064caELSA-2019-4732el5_u5_i386_patch
kernel-debug-2.6.18-194.8.1.0.1.el5.i686.rpmb2894d35fe119a5be0042baf1b2b0bef5533032006930e2c33fdd4b4eba2179bELSA-2019-4732el5_u5_i386_patch
kernel-debug-devel-2.6.18-194.8.1.0.1.el5.i686.rpm081b176dd91307912ae00b39ee6ecb3089f13658e795885d02c76c6c022891f8ELSA-2019-4732el5_u5_i386_patch
kernel-devel-2.6.18-194.8.1.0.1.el5.i686.rpm2bc0bf30199578a786140b6af1725ab37db6c542b4ec5b244ab81466daf9bcccELSA-2019-4732el5_u5_i386_patch
kernel-doc-2.6.18-194.8.1.0.1.el5.noarch.rpm1170439a33b26ac2c10e030a859fe635d1a5e051cf8f3aa0a09e77e420e4f036ELSA-2019-4732el5_u5_i386_patch
kernel-headers-2.6.18-194.8.1.0.1.el5.i386.rpma4cd81648122483fd3f17a7457b1f891bf7f0cb4c7631afde6cde9f23d370e09ELSA-2019-4732el5_u5_i386_patch
kernel-xen-2.6.18-194.8.1.0.1.el5.i686.rpm0ad50061d7a16ab738b7b47dca6a6b23565350558d738d1bb9b740fdaf229bbcELSA-2019-4732el5_u5_i386_patch
kernel-xen-devel-2.6.18-194.8.1.0.1.el5.i686.rpm78aca3c88bce6baf9900c3b16f736039a02fb8afae876f9cf01d61d2815bee4fELSA-2019-4732el5_u5_i386_patch
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.i686.rpmc6382779d0b1276c2d6c6103591bd9c5625f92a7010a318b9603006676538d73-el5_u5_i386_patch
ocfs2-2.6.18-194.8.1.0.1.el5PAE-1.4.7-1.el5.i686.rpm358d82d8b2aeab772ca670b896950ad04687a99bf7ed29021f723f1b568d18ed-el5_u5_i386_patch
ocfs2-2.6.18-194.8.1.0.1.el5debug-1.4.7-1.el5.i686.rpm5f644a49c2bb4bef9a21a01e6c0e26fec44798aa676a2c6f09bcbaef75de49dd-el5_u5_i386_patch
ocfs2-2.6.18-194.8.1.0.1.el5xen-1.4.7-1.el5.i686.rpmf39c8180c9cb6416af804ef7e777401643219dee3211db0cbbe3141ac72c8131-el5_u5_i386_patch
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.i686.rpmebbcade46f3af8e5dbd3cb6298efe77497fb90d235a397a7dcabb2edfd603cda-el5_u5_i386_patch
oracleasm-2.6.18-194.8.1.0.1.el5PAE-2.0.5-1.el5.i686.rpmb2ee6e0ba1d06cd2ba01f2e6a91fa7394dbc38868166f71e5ed2f1aeed61cae6-el5_u5_i386_patch
oracleasm-2.6.18-194.8.1.0.1.el5debug-2.0.5-1.el5.i686.rpm90aefbff01840cc3e5d323a94492e7f9184bce5de276272d5ec7f23c1c765a16-el5_u5_i386_patch
oracleasm-2.6.18-194.8.1.0.1.el5xen-2.0.5-1.el5.i686.rpm3c0eeaf87d52b975db5dcc3af2b19abfd4ce2057b0dda5352cb0efbc134c1819-el5_u5_i386_patch
Oracle Linux 5 (ia64) kernel-2.6.18-194.8.1.0.1.el5.src.rpmb071505cb8e47d1ee02cd65ae49e1b76c15136147bcef03945b12142c965238bELSA-2019-4732el5_u5_ia64_patch
kernel-2.6.18-194.8.1.0.1.el5.src.rpmb071505cb8e47d1ee02cd65ae49e1b76c15136147bcef03945b12142c965238bELSA-2019-4732ol5_ia64_latest
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.src.rpm8cdc9d0120315e1529ab2a550d85ab2fda970eb2cad95f035a29782a020ac934-el5_u5_ia64_patch
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.src.rpm8cdc9d0120315e1529ab2a550d85ab2fda970eb2cad95f035a29782a020ac934-ol5_ia64_latest
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.src.rpm0d7ab4fa6f8efd53ae9de1b2b724e14cb0d709bb9a8e4948766fc346d4a0fc30-el5_u5_ia64_patch
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.src.rpm0d7ab4fa6f8efd53ae9de1b2b724e14cb0d709bb9a8e4948766fc346d4a0fc30-ol5_ia64_latest
kernel-2.6.18-194.8.1.0.1.el5.ia64.rpm24b908a665f2c6b828f116839ecd0b83eed2ff86b1bb6e1e5b14fb62c8319126ELSA-2019-4732el5_u5_ia64_patch
kernel-2.6.18-194.8.1.0.1.el5.ia64.rpm24b908a665f2c6b828f116839ecd0b83eed2ff86b1bb6e1e5b14fb62c8319126ELSA-2019-4732ol5_ia64_latest
kernel-debug-2.6.18-194.8.1.0.1.el5.ia64.rpm920ed634e61347f78cc4ca2c4669c7450ae68f11f4726a3d07ee9e66c946a38eELSA-2019-4732el5_u5_ia64_patch
kernel-debug-2.6.18-194.8.1.0.1.el5.ia64.rpm920ed634e61347f78cc4ca2c4669c7450ae68f11f4726a3d07ee9e66c946a38eELSA-2019-4732ol5_ia64_latest
kernel-debug-devel-2.6.18-194.8.1.0.1.el5.ia64.rpmd681aa64d69b6715d96b027f003b8e685575066988a20ffdc68ba28e690bfc47ELSA-2019-4732el5_u5_ia64_patch
kernel-debug-devel-2.6.18-194.8.1.0.1.el5.ia64.rpmd681aa64d69b6715d96b027f003b8e685575066988a20ffdc68ba28e690bfc47ELSA-2019-4732ol5_ia64_latest
kernel-devel-2.6.18-194.8.1.0.1.el5.ia64.rpm9ca546929be7cb7be7044906c3ec7bbb4452d634b744e26ecfba68286765747cELSA-2019-4732el5_u5_ia64_patch
kernel-devel-2.6.18-194.8.1.0.1.el5.ia64.rpm9ca546929be7cb7be7044906c3ec7bbb4452d634b744e26ecfba68286765747cELSA-2019-4732ol5_ia64_latest
kernel-doc-2.6.18-194.8.1.0.1.el5.noarch.rpm1170439a33b26ac2c10e030a859fe635d1a5e051cf8f3aa0a09e77e420e4f036ELSA-2019-4732el5_u5_ia64_patch
kernel-doc-2.6.18-194.8.1.0.1.el5.noarch.rpm1170439a33b26ac2c10e030a859fe635d1a5e051cf8f3aa0a09e77e420e4f036ELSA-2019-4732ol5_ia64_latest
kernel-headers-2.6.18-194.8.1.0.1.el5.ia64.rpmd9610d1cb973f34e5d68677016509b29dd382c336a0bfc81506fd6648c7f9211ELSA-2019-4732el5_u5_ia64_patch
kernel-headers-2.6.18-194.8.1.0.1.el5.ia64.rpmd9610d1cb973f34e5d68677016509b29dd382c336a0bfc81506fd6648c7f9211ELSA-2019-4732ol5_ia64_latest
kernel-xen-2.6.18-194.8.1.0.1.el5.ia64.rpm72b774415932ee75b4421df32c8da516e181360368346d4498aee4f88a420cddELSA-2019-4732el5_u5_ia64_patch
kernel-xen-2.6.18-194.8.1.0.1.el5.ia64.rpm72b774415932ee75b4421df32c8da516e181360368346d4498aee4f88a420cddELSA-2019-4732ol5_ia64_latest
kernel-xen-devel-2.6.18-194.8.1.0.1.el5.ia64.rpmfd8e1e38ca8409a89c4b58329cd4baca2ddf1deba38721473ff32d27114fab41ELSA-2019-4732el5_u5_ia64_patch
kernel-xen-devel-2.6.18-194.8.1.0.1.el5.ia64.rpmfd8e1e38ca8409a89c4b58329cd4baca2ddf1deba38721473ff32d27114fab41ELSA-2019-4732ol5_ia64_latest
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.ia64.rpmd0af3ccf6bc08b42fa2ec122c099933d303d0553c76178207717b1d03cb6bcd5-el5_u5_ia64_patch
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.ia64.rpmd0af3ccf6bc08b42fa2ec122c099933d303d0553c76178207717b1d03cb6bcd5-ol5_ia64_latest
ocfs2-2.6.18-194.8.1.0.1.el5debug-1.4.7-1.el5.ia64.rpm5f3fe5b46ab5798d6d43f22578ffde31f458465bd6a8426e1b92b5d1b0d9bf9c-el5_u5_ia64_patch
ocfs2-2.6.18-194.8.1.0.1.el5debug-1.4.7-1.el5.ia64.rpm5f3fe5b46ab5798d6d43f22578ffde31f458465bd6a8426e1b92b5d1b0d9bf9c-ol5_ia64_latest
ocfs2-2.6.18-194.8.1.0.1.el5xen-1.4.7-1.el5.ia64.rpm96c3048212d30a0b324552b4a7c51c090269b2975b319ba695c92586f1025ee0-el5_u5_ia64_patch
ocfs2-2.6.18-194.8.1.0.1.el5xen-1.4.7-1.el5.ia64.rpm96c3048212d30a0b324552b4a7c51c090269b2975b319ba695c92586f1025ee0-ol5_ia64_latest
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.ia64.rpm02080fb4e15b06fc0bedb8c49fc02c95c2dee1632e66e292bf8c013062c61114-el5_u5_ia64_patch
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.ia64.rpm02080fb4e15b06fc0bedb8c49fc02c95c2dee1632e66e292bf8c013062c61114-ol5_ia64_latest
oracleasm-2.6.18-194.8.1.0.1.el5debug-2.0.5-1.el5.ia64.rpm2abdd187fb6886ea499bdfa78d9c05c02eb7fc57d0165a96a3cc5c56ca123956-el5_u5_ia64_patch
oracleasm-2.6.18-194.8.1.0.1.el5debug-2.0.5-1.el5.ia64.rpm2abdd187fb6886ea499bdfa78d9c05c02eb7fc57d0165a96a3cc5c56ca123956-ol5_ia64_latest
oracleasm-2.6.18-194.8.1.0.1.el5xen-2.0.5-1.el5.ia64.rpmbe69863005967d17a705d815f6038d6cff3ff66b3bea9c4a54d137d61c8aaac8-el5_u5_ia64_patch
oracleasm-2.6.18-194.8.1.0.1.el5xen-2.0.5-1.el5.ia64.rpmbe69863005967d17a705d815f6038d6cff3ff66b3bea9c4a54d137d61c8aaac8-ol5_ia64_latest
Oracle Linux 5 (x86_64) kernel-2.6.18-194.8.1.0.1.el5.src.rpmb071505cb8e47d1ee02cd65ae49e1b76c15136147bcef03945b12142c965238bELSA-2019-4732el5_u5_x86_64_patch
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.src.rpm8cdc9d0120315e1529ab2a550d85ab2fda970eb2cad95f035a29782a020ac934-el5_u5_x86_64_patch
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.src.rpm0d7ab4fa6f8efd53ae9de1b2b724e14cb0d709bb9a8e4948766fc346d4a0fc30-el5_u5_x86_64_patch
kernel-2.6.18-194.8.1.0.1.el5.x86_64.rpm860ce3b186ad88d0572b284cd17b64699fafbf5031d4c3cf3da0f6263b9779eaELSA-2019-4732el5_u5_x86_64_patch
kernel-debug-2.6.18-194.8.1.0.1.el5.x86_64.rpm5bce1d00d04bedbd8787925ef29d269587207037df4fa86a6f55d3f03a0c3e74ELSA-2019-4732el5_u5_x86_64_patch
kernel-debug-devel-2.6.18-194.8.1.0.1.el5.x86_64.rpmea29fd37d77cbc6a23c42790d9d4f2fd45ee2a23f61f71c14612f8721052af3fELSA-2019-4732el5_u5_x86_64_patch
kernel-devel-2.6.18-194.8.1.0.1.el5.x86_64.rpm16842a53995c57b024b6377436b990730f129144f303d54528d654aeae7cfa73ELSA-2019-4732el5_u5_x86_64_patch
kernel-doc-2.6.18-194.8.1.0.1.el5.noarch.rpm1170439a33b26ac2c10e030a859fe635d1a5e051cf8f3aa0a09e77e420e4f036ELSA-2019-4732el5_u5_x86_64_patch
kernel-headers-2.6.18-194.8.1.0.1.el5.x86_64.rpm9b79c824b99f26d82c80d5e7182c9f2ec70a110607a08d24c1904e529892ffc1ELSA-2019-4732el5_u5_x86_64_patch
kernel-xen-2.6.18-194.8.1.0.1.el5.x86_64.rpm2f82f301f4d978411c9a8aceb951f5b4f69004d040ec06f9612920a55880034eELSA-2019-4732el5_u5_x86_64_patch
kernel-xen-devel-2.6.18-194.8.1.0.1.el5.x86_64.rpm6799321c35922f3af6423b2b700b06978f35bb91bb5b749bea1641fafdc3020fELSA-2019-4732el5_u5_x86_64_patch
ocfs2-2.6.18-194.8.1.0.1.el5-1.4.7-1.el5.x86_64.rpm3ea13f04de53f31ff6cd5f621eebda68b22c418ad6cc011235f65cf94a3a5607-el5_u5_x86_64_patch
ocfs2-2.6.18-194.8.1.0.1.el5debug-1.4.7-1.el5.x86_64.rpm2072bb8cbd27fa5cea17c4c61492916c0766bcf152a46950b3b883e89ff61911-el5_u5_x86_64_patch
ocfs2-2.6.18-194.8.1.0.1.el5xen-1.4.7-1.el5.x86_64.rpmefacc12e4a17a39c928f09068abb4405634bce64caa0a375e8bdbe81fcfb0391-el5_u5_x86_64_patch
oracleasm-2.6.18-194.8.1.0.1.el5-2.0.5-1.el5.x86_64.rpm33562f894eeffbac7cc15dbabc04c102ae0c91fccac70875ba8b1d1cb322e06f-el5_u5_x86_64_patch
oracleasm-2.6.18-194.8.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpme91aff289a764ef6b1cb851654b4718b57b2e523d1ceec9499ba2c1578d1a033-el5_u5_x86_64_patch
oracleasm-2.6.18-194.8.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm3c4ef09b6a848506d15115db9dc017dce3877dc25b34459feccb21be3ceaf688-el5_u5_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete