ELSA-2010-0723

ELSA-2010-0723 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2010-09-29

Description


[2.6.18-194.17.1.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change
(Chuck Anderson) [orabug 7556514]
- Add entropy support to igb (John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]
[bz 7258]
- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)
[orabug 7579314]
- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin)
[orabug 9504524]
- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]
RDS: Fix BUG_ONs to not fire when in a tasklet
ipoib: Fix lockup of the tx queue
RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)
RDS: Properly unmap when getting a remote access error (Tina Yang)
RDS: Fix locking in rds_send_drop_to()
- [mm] Enhance shrink_zone patch allow full swap utilization, and also be
NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)
[orabug 9245919]
- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)
[orabug 9107465]
- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)
[orabug 9764220]
- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,
Guru Anbalagane) [orabug 6124033]
- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
- [ib] fix memory corruption (Andy Grover) [orabug 9972346]

[2.6.18-194.17.1.el5]
- Syncing following patch from branched build:
- [misc] make compat_alloc_user_space() incorporate the access_ok()
(Don Howard) [634463 634464] {CVE-2010-3081}

[2.6.18-194.16.1.el5]
- [fs] xfs: fix missing untrusted inode lookup tag (Dave Chinner)
[624366 607032] {CVE-2010-2943}

[2.6.18-194.15.1.el5]
- [net] cxgb3: don't flush workqueue if called from wq (Doug Ledford)
[630978 630124]
- [net] cxgb3: get fatal parity error status on interrupt (Doug Ledford)
[630978 630124]
- [net] cxgb3: clear fatal parity error register on init (Doug Ledford)
[630978 630124]
- [net] cxgb3: add define for fatal parity error bit (Doug Ledford)
[630978 630124]

[2.6.18-194.14.1.el5]
- [s390] dasd: force online does not work (Hendrik Brueckner) [627194 619466]
- [s390] dasd: allocate fallback cqr for reserve/release (Hendrik Brueckner)
[627195 619465]
- [fs] xfs: fix untrusted inode number lookup (Dave Chinner) [629219 624862]
- [net] sched: fix some kernel memory leaks (Jiri Pirko) [624904 624638]
{CVE-2010-2942}
- [usb] fix usbfs information leak (Eugene Teo) [566628 566629] {CVE-2010-1083}
- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave Chinner)
[624366 607032] {CVE-2010-2943}
- [fs] xfs: validate untrusted inode numbers during lookup (Dave Chinner)
[624366 607032] {CVE-2010-2943}
- [fs] xfs: always use iget in bulkstat (Dave Chinner) [624366 607032]
{CVE-2010-2943}

[2.6.18-194.13.1.el5]
- [xen] fix guest crash on non-EPT machine may crash host (Paolo Bonzini)
[621429 621430] {CVE-2010-2938}
- [fs] ext4: consolidate in_range definitions (Eric Sandeen) [624331 624332]
{CVE-2010-3015}
- [mm] add option to skip ZERO_PAGE mmap of /dev/zero (Larry Woodman)
[623141 619541]
- [net] bonding: check if clients MAC addr has changed (Flavio Leitner)
[623143 610234]
- [net] sctp: fix length checks (Neil Horman) [624369 605305]
- [xen] bring back VMXE/SVME flags (Andrew Jones) [624365 570091]
- Syncing following patches from branched builds:
- [mm] accept an abutting stack segment (Jiri Pirko) [607857 607858]
{CVE-2010-2240}
- [mm] pass correct mm when growing stack (Jiri Pirko) [607857 607858]
{CVE-2010-2240}
- [mm] fix up some user-visible effects of stack guard page (Jiri Pirko)
[607857 607858] {CVE-2010-2240}
- [mm] fix page table unmap for stack guard page properly (Jiri Pirko)
[607857 607858] {CVE-2010-2240}
- [mm] fix missing unmap for stack guard page failure case (Jiri Pirko)
[607857 607858] {CVE-2010-2240}
- [mm] keep a guard page below a grow-down stack segment (Jiri Pirko)
[607857 607858] {CVE-2010-2240}


Related CVEs


CVE-2010-1083
CVE-2010-2492
CVE-2010-2798
CVE-2010-2938
CVE-2010-2942
CVE-2010-2943
CVE-2010-3015

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-2.6.18-194.17.1.0.1.el5.src.rpm1043dfed8baf60adfdea180fba7a957bELSA-2019-4732
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.src.rpmebe0c5753026b64afd44e6d804882019-
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.src.rpmf1fb88150eb06f921d1c474dc0c8240b-
kernel-2.6.18-194.17.1.0.1.el5.i686.rpmdaa79632c04e610966444acc8262882aELSA-2019-4732
kernel-PAE-2.6.18-194.17.1.0.1.el5.i686.rpmb48269e9831da761a2e3e0394612021dELSA-2019-4732
kernel-PAE-devel-2.6.18-194.17.1.0.1.el5.i686.rpmc66bb63902e4f0b5706ceccde97eeca6ELSA-2019-4732
kernel-debug-2.6.18-194.17.1.0.1.el5.i686.rpm7fabc503f5484040ee892aa8d52b9cf9ELSA-2019-4732
kernel-debug-devel-2.6.18-194.17.1.0.1.el5.i686.rpm7135e8187d00a3c8280623b49e820f54ELSA-2019-4732
kernel-devel-2.6.18-194.17.1.0.1.el5.i686.rpmd30f4a0c9582d71b5beade85ca2716dfELSA-2019-4732
kernel-doc-2.6.18-194.17.1.0.1.el5.noarch.rpm0569a780e10c34c1c2c4f8a15c0956b5ELSA-2019-4732
kernel-headers-2.6.18-194.17.1.0.1.el5.i386.rpmaee950a453178b0e39acc24baaa39c7bELSA-2019-4732
kernel-xen-2.6.18-194.17.1.0.1.el5.i686.rpm5aa6562559255216376edaf5808d1df3ELSA-2019-4732
kernel-xen-devel-2.6.18-194.17.1.0.1.el5.i686.rpm93cae1668921c92f6d2e507b87944cc0ELSA-2019-4732
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.i686.rpm70c6f741a056d4c659604c4317526491-
ocfs2-2.6.18-194.17.1.0.1.el5PAE-1.4.7-1.el5.i686.rpm465c229b8f4d70cff46ec61337dda8a7-
ocfs2-2.6.18-194.17.1.0.1.el5debug-1.4.7-1.el5.i686.rpmd227c08daf78d36c1d8d048d566258b7-
ocfs2-2.6.18-194.17.1.0.1.el5xen-1.4.7-1.el5.i686.rpm2fa55576087263dd9108dc878ff5ad84-
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.i686.rpmede35f01ffb028dcc77b231d9267febe-
oracleasm-2.6.18-194.17.1.0.1.el5PAE-2.0.5-1.el5.i686.rpm4add924608c3fc8603d7baa53bd59cc0-
oracleasm-2.6.18-194.17.1.0.1.el5debug-2.0.5-1.el5.i686.rpm8809b085f3cc91cade36c52532471b28-
oracleasm-2.6.18-194.17.1.0.1.el5xen-2.0.5-1.el5.i686.rpm0bf53a55043e1fba8ea4ac134a5718d6-
Oracle Linux 5 (ia64) kernel-2.6.18-194.17.1.0.1.el5.src.rpm1043dfed8baf60adfdea180fba7a957bELSA-2019-4732
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.src.rpmebe0c5753026b64afd44e6d804882019-
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.src.rpmf1fb88150eb06f921d1c474dc0c8240b-
kernel-2.6.18-194.17.1.0.1.el5.ia64.rpme07aef72cda67e06134b22244dda6a5bELSA-2019-4732
kernel-debug-2.6.18-194.17.1.0.1.el5.ia64.rpm7cfc4ad43e42404c869a5aecb61b90eaELSA-2019-4732
kernel-debug-devel-2.6.18-194.17.1.0.1.el5.ia64.rpmcf8fe7971ae13d2df2f1ed2f686b26c9ELSA-2019-4732
kernel-devel-2.6.18-194.17.1.0.1.el5.ia64.rpm5d26e798fc15230bbfab6f4364cc8568ELSA-2019-4732
kernel-doc-2.6.18-194.17.1.0.1.el5.noarch.rpm0569a780e10c34c1c2c4f8a15c0956b5ELSA-2019-4732
kernel-headers-2.6.18-194.17.1.0.1.el5.ia64.rpm0eabc8a046a4136a2ddf0d48398724abELSA-2019-4732
kernel-xen-2.6.18-194.17.1.0.1.el5.ia64.rpmfc34177661a26feb13346f39f1613c89ELSA-2019-4732
kernel-xen-devel-2.6.18-194.17.1.0.1.el5.ia64.rpm0fc977f932f753a9a8f1f18cbcbd64a2ELSA-2019-4732
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.ia64.rpme4c831cda181cd030bbd12777d925c79-
ocfs2-2.6.18-194.17.1.0.1.el5debug-1.4.7-1.el5.ia64.rpmee620b4db41809030688958a42937316-
ocfs2-2.6.18-194.17.1.0.1.el5xen-1.4.7-1.el5.ia64.rpmf1c53ef7c710702c71d1f62f4a6e2139-
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.ia64.rpme939736fdb70cb27dd1c7ab1f16609b2-
oracleasm-2.6.18-194.17.1.0.1.el5debug-2.0.5-1.el5.ia64.rpm6b0874f40163262d5f5bd4f209d44e89-
oracleasm-2.6.18-194.17.1.0.1.el5xen-2.0.5-1.el5.ia64.rpm8fa7c7775d630e88aa6a15533c20da0d-
Oracle Linux 5 (x86_64) kernel-2.6.18-194.17.1.0.1.el5.src.rpm1043dfed8baf60adfdea180fba7a957bELSA-2019-4732
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.src.rpmebe0c5753026b64afd44e6d804882019-
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.src.rpmf1fb88150eb06f921d1c474dc0c8240b-
kernel-2.6.18-194.17.1.0.1.el5.x86_64.rpm4c10976091a21e6156f5bb6b3239d0c3ELSA-2019-4732
kernel-debug-2.6.18-194.17.1.0.1.el5.x86_64.rpmb7bc5b6d8a38aa24678afae7637bad91ELSA-2019-4732
kernel-debug-devel-2.6.18-194.17.1.0.1.el5.x86_64.rpmce1793dffddb951ef5a560bafd944494ELSA-2019-4732
kernel-devel-2.6.18-194.17.1.0.1.el5.x86_64.rpm4d9e371809806b9a718e37bcfe93bdaeELSA-2019-4732
kernel-doc-2.6.18-194.17.1.0.1.el5.noarch.rpm0569a780e10c34c1c2c4f8a15c0956b5ELSA-2019-4732
kernel-headers-2.6.18-194.17.1.0.1.el5.x86_64.rpm3aab1363d947129b437ddb5c82170dd0ELSA-2019-4732
kernel-xen-2.6.18-194.17.1.0.1.el5.x86_64.rpm1167f87277d02b1b0491aa9743700d09ELSA-2019-4732
kernel-xen-devel-2.6.18-194.17.1.0.1.el5.x86_64.rpmf28cc3d48f64c9f881561582f36e62d4ELSA-2019-4732
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.x86_64.rpm00976b8bf851a7f440cbedb98ce6d663-
ocfs2-2.6.18-194.17.1.0.1.el5debug-1.4.7-1.el5.x86_64.rpmc0170ef0c017741329edef748aa973b8-
ocfs2-2.6.18-194.17.1.0.1.el5xen-1.4.7-1.el5.x86_64.rpm826a5ae71433a6cefe1c6a1a8e46cf11-
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.x86_64.rpm4bc7dd0ed135b6ac7ef4e6b1875a6ace-
oracleasm-2.6.18-194.17.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm50dcbf248ad0e1fe2f6e1a19cefe451e-
oracleasm-2.6.18-194.17.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm603e5a229c887d4efcbe3706370c3d66-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete