ELSA-2010-0723

ELSA-2010-0723 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2010-09-29

Description


[2.6.18-194.17.1.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change
(Chuck Anderson) [orabug 7556514]
- Add entropy support to igb (John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]
[bz 7258]
- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)
[orabug 7579314]
- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin)
[orabug 9504524]
- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]
RDS: Fix BUG_ONs to not fire when in a tasklet
ipoib: Fix lockup of the tx queue
RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)
RDS: Properly unmap when getting a remote access error (Tina Yang)
RDS: Fix locking in rds_send_drop_to()
- [mm] Enhance shrink_zone patch allow full swap utilization, and also be
NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)
[orabug 9245919]
- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)
[orabug 9107465]
- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)
[orabug 9764220]
- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,
Guru Anbalagane) [orabug 6124033]
- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
- [ib] fix memory corruption (Andy Grover) [orabug 9972346]

[2.6.18-194.17.1.el5]
- Syncing following patch from branched build:
- [misc] make compat_alloc_user_space() incorporate the access_ok()
(Don Howard) [634463 634464] {CVE-2010-3081}

[2.6.18-194.16.1.el5]
- [fs] xfs: fix missing untrusted inode lookup tag (Dave Chinner)
[624366 607032] {CVE-2010-2943}

[2.6.18-194.15.1.el5]
- [net] cxgb3: don't flush workqueue if called from wq (Doug Ledford)
[630978 630124]
- [net] cxgb3: get fatal parity error status on interrupt (Doug Ledford)
[630978 630124]
- [net] cxgb3: clear fatal parity error register on init (Doug Ledford)
[630978 630124]
- [net] cxgb3: add define for fatal parity error bit (Doug Ledford)
[630978 630124]

[2.6.18-194.14.1.el5]
- [s390] dasd: force online does not work (Hendrik Brueckner) [627194 619466]
- [s390] dasd: allocate fallback cqr for reserve/release (Hendrik Brueckner)
[627195 619465]
- [fs] xfs: fix untrusted inode number lookup (Dave Chinner) [629219 624862]
- [net] sched: fix some kernel memory leaks (Jiri Pirko) [624904 624638]
{CVE-2010-2942}
- [usb] fix usbfs information leak (Eugene Teo) [566628 566629] {CVE-2010-1083}
- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave Chinner)
[624366 607032] {CVE-2010-2943}
- [fs] xfs: validate untrusted inode numbers during lookup (Dave Chinner)
[624366 607032] {CVE-2010-2943}
- [fs] xfs: always use iget in bulkstat (Dave Chinner) [624366 607032]
{CVE-2010-2943}

[2.6.18-194.13.1.el5]
- [xen] fix guest crash on non-EPT machine may crash host (Paolo Bonzini)
[621429 621430] {CVE-2010-2938}
- [fs] ext4: consolidate in_range definitions (Eric Sandeen) [624331 624332]
{CVE-2010-3015}
- [mm] add option to skip ZERO_PAGE mmap of /dev/zero (Larry Woodman)
[623141 619541]
- [net] bonding: check if clients MAC addr has changed (Flavio Leitner)
[623143 610234]
- [net] sctp: fix length checks (Neil Horman) [624369 605305]
- [xen] bring back VMXE/SVME flags (Andrew Jones) [624365 570091]
- Syncing following patches from branched builds:
- [mm] accept an abutting stack segment (Jiri Pirko) [607857 607858]
{CVE-2010-2240}
- [mm] pass correct mm when growing stack (Jiri Pirko) [607857 607858]
{CVE-2010-2240}
- [mm] fix up some user-visible effects of stack guard page (Jiri Pirko)
[607857 607858] {CVE-2010-2240}
- [mm] fix page table unmap for stack guard page properly (Jiri Pirko)
[607857 607858] {CVE-2010-2240}
- [mm] fix missing unmap for stack guard page failure case (Jiri Pirko)
[607857 607858] {CVE-2010-2240}
- [mm] keep a guard page below a grow-down stack segment (Jiri Pirko)
[607857 607858] {CVE-2010-2240}


Related CVEs


CVE-2010-1083
CVE-2010-2938
CVE-2010-2943
CVE-2010-2492
CVE-2010-2798
CVE-2010-2942
CVE-2010-3015

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) kernel-2.6.18-194.17.1.0.1.el5.src.rpmb6e422440bf67b7c0c23bc9a66591e759eaf2334a1a0e7555fc5617ef718345aELSA-2019-4732el5_u5_i386_patch
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.src.rpmb894c214b57bac69531adbe6056d137654d938f17dfecc80f39614b843eea4b0-el5_u5_i386_patch
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.src.rpm1227bb5d91d458fae65a2f2e6bbf9433d902d7ebae00557fbe88865eb6ae1e65-el5_u5_i386_patch
kernel-2.6.18-194.17.1.0.1.el5.i686.rpm3a5059be9d29064212f8fa70d9c8f60d5829ed0a79d0b2beef67496f326da73eELSA-2019-4732el5_u5_i386_patch
kernel-PAE-2.6.18-194.17.1.0.1.el5.i686.rpm6586ae58e594df7a0782cbda396b37c4f03d3e567a41cf2b21927372f15c111aELSA-2019-4732el5_u5_i386_patch
kernel-PAE-devel-2.6.18-194.17.1.0.1.el5.i686.rpm1ab4be66187c1bd18fea7e6e94efc3c249b2895139da3d167397e8f1a14cd16aELSA-2019-4732el5_u5_i386_patch
kernel-debug-2.6.18-194.17.1.0.1.el5.i686.rpmac13fea5211351b51e1846e455bf0fe7576b42794043ebc45173a32e250ed085ELSA-2019-4732el5_u5_i386_patch
kernel-debug-devel-2.6.18-194.17.1.0.1.el5.i686.rpm5f4d4cac22022a187ad15bf8cd695988c98b9d5999311cc586feeb4b5b760570ELSA-2019-4732el5_u5_i386_patch
kernel-devel-2.6.18-194.17.1.0.1.el5.i686.rpm72b0aafdf44ac6369cdfa95a9f4a8b4d15676a821775acb5bf05a35eacadac61ELSA-2019-4732el5_u5_i386_patch
kernel-doc-2.6.18-194.17.1.0.1.el5.noarch.rpmc57454f07317f57a3bc7a991e494356c8922a8461c090e007c47e727d5bf971eELSA-2019-4732el5_u5_i386_patch
kernel-headers-2.6.18-194.17.1.0.1.el5.i386.rpm59e2efce5037a7d181e2843091162bb33ea94923a9b0caffa686cb9f28d5b9ffELSA-2019-4732el5_u5_i386_patch
kernel-xen-2.6.18-194.17.1.0.1.el5.i686.rpm4511e20d8d11d791beadfbe408ba5e473555b51182ff7fed163002caef4c9a2fELSA-2019-4732el5_u5_i386_patch
kernel-xen-devel-2.6.18-194.17.1.0.1.el5.i686.rpm7cfb40cf9a1bffcd98cc51537c4f3816baa597882dcb7ec16dde9e21a8c067d4ELSA-2019-4732el5_u5_i386_patch
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.i686.rpm51f5ee832343c8a3dc7195722fd25ce156f1484f8d1423c4f24786dd3c4faa3f-el5_u5_i386_patch
ocfs2-2.6.18-194.17.1.0.1.el5PAE-1.4.7-1.el5.i686.rpm3173a5725d4f23202407b04dda91ec8ebdcf23bc54a5343b0d78be3412d29768-el5_u5_i386_patch
ocfs2-2.6.18-194.17.1.0.1.el5debug-1.4.7-1.el5.i686.rpmff993f779f656702f741c86d14c99a347d0aae4f9b983ce7b43f64468bd44983-el5_u5_i386_patch
ocfs2-2.6.18-194.17.1.0.1.el5xen-1.4.7-1.el5.i686.rpmcbb13cebec8b965de6b04b57a67903c33007fa98f742a6bbe5dd1bb04d220d4a-el5_u5_i386_patch
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.i686.rpm4a48827a7cb9abd369714a390f61130e05f73807ee57eeda184012d89d4370b5-el5_u5_i386_patch
oracleasm-2.6.18-194.17.1.0.1.el5PAE-2.0.5-1.el5.i686.rpme303f0f154907112d603e062865760e0e4ab6ce20011535404000ab6cdf4a54a-el5_u5_i386_patch
oracleasm-2.6.18-194.17.1.0.1.el5debug-2.0.5-1.el5.i686.rpmaae5f6f39bec3875b2329ea63b721c91713a17f460bb569a47d87035a306f3e5-el5_u5_i386_patch
oracleasm-2.6.18-194.17.1.0.1.el5xen-2.0.5-1.el5.i686.rpm22a18cdaba2578b6ee21b2780a8dcd4a1e12751dfeca717ac83610041ea23d7a-el5_u5_i386_patch
Oracle Linux 5 (ia64) kernel-2.6.18-194.17.1.0.1.el5.src.rpmb6e422440bf67b7c0c23bc9a66591e759eaf2334a1a0e7555fc5617ef718345aELSA-2019-4732el5_u5_ia64_patch
kernel-2.6.18-194.17.1.0.1.el5.src.rpmb6e422440bf67b7c0c23bc9a66591e759eaf2334a1a0e7555fc5617ef718345aELSA-2019-4732ol5_ia64_latest
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.src.rpmb894c214b57bac69531adbe6056d137654d938f17dfecc80f39614b843eea4b0-el5_u5_ia64_patch
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.src.rpmb894c214b57bac69531adbe6056d137654d938f17dfecc80f39614b843eea4b0-ol5_ia64_latest
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.src.rpm1227bb5d91d458fae65a2f2e6bbf9433d902d7ebae00557fbe88865eb6ae1e65-el5_u5_ia64_patch
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.src.rpm1227bb5d91d458fae65a2f2e6bbf9433d902d7ebae00557fbe88865eb6ae1e65-ol5_ia64_latest
kernel-2.6.18-194.17.1.0.1.el5.ia64.rpma5e4a943ae0a25c12d7c6566e86921e7e8d7bd3a854e09d926f8d1c210e49c39ELSA-2019-4732el5_u5_ia64_patch
kernel-2.6.18-194.17.1.0.1.el5.ia64.rpma5e4a943ae0a25c12d7c6566e86921e7e8d7bd3a854e09d926f8d1c210e49c39ELSA-2019-4732ol5_ia64_latest
kernel-debug-2.6.18-194.17.1.0.1.el5.ia64.rpm8711d88fa26c9252452f370664cc98ecfcf72c0dc2ddd558cc35594d8be307c0ELSA-2019-4732el5_u5_ia64_patch
kernel-debug-2.6.18-194.17.1.0.1.el5.ia64.rpm8711d88fa26c9252452f370664cc98ecfcf72c0dc2ddd558cc35594d8be307c0ELSA-2019-4732ol5_ia64_latest
kernel-debug-devel-2.6.18-194.17.1.0.1.el5.ia64.rpm243a8e8dc82b4b70f2c1dc462af644667d60c8016db2d13d1db19f592b32d2a7ELSA-2019-4732el5_u5_ia64_patch
kernel-debug-devel-2.6.18-194.17.1.0.1.el5.ia64.rpm243a8e8dc82b4b70f2c1dc462af644667d60c8016db2d13d1db19f592b32d2a7ELSA-2019-4732ol5_ia64_latest
kernel-devel-2.6.18-194.17.1.0.1.el5.ia64.rpmd4016ad12525641f472ecc04e2b8c1ef24a718c9e9d241793070fbcd756ce84fELSA-2019-4732el5_u5_ia64_patch
kernel-devel-2.6.18-194.17.1.0.1.el5.ia64.rpmd4016ad12525641f472ecc04e2b8c1ef24a718c9e9d241793070fbcd756ce84fELSA-2019-4732ol5_ia64_latest
kernel-doc-2.6.18-194.17.1.0.1.el5.noarch.rpmc57454f07317f57a3bc7a991e494356c8922a8461c090e007c47e727d5bf971eELSA-2019-4732el5_u5_ia64_patch
kernel-doc-2.6.18-194.17.1.0.1.el5.noarch.rpmc57454f07317f57a3bc7a991e494356c8922a8461c090e007c47e727d5bf971eELSA-2019-4732ol5_ia64_latest
kernel-headers-2.6.18-194.17.1.0.1.el5.ia64.rpm175732715206cf2947aded31ea4bddcf4ab3e401fa23c4e87a57724ab20dddd3ELSA-2019-4732el5_u5_ia64_patch
kernel-headers-2.6.18-194.17.1.0.1.el5.ia64.rpm175732715206cf2947aded31ea4bddcf4ab3e401fa23c4e87a57724ab20dddd3ELSA-2019-4732ol5_ia64_latest
kernel-xen-2.6.18-194.17.1.0.1.el5.ia64.rpme4295ca919caec6bc741cb51d7692874c61b8e7264e43c849cd3bbe5fee784d3ELSA-2019-4732el5_u5_ia64_patch
kernel-xen-2.6.18-194.17.1.0.1.el5.ia64.rpme4295ca919caec6bc741cb51d7692874c61b8e7264e43c849cd3bbe5fee784d3ELSA-2019-4732ol5_ia64_latest
kernel-xen-devel-2.6.18-194.17.1.0.1.el5.ia64.rpm2c5cf85630e01cab3244b7d1be75c64afac486582870425e5542428d0e21e9e7ELSA-2019-4732el5_u5_ia64_patch
kernel-xen-devel-2.6.18-194.17.1.0.1.el5.ia64.rpm2c5cf85630e01cab3244b7d1be75c64afac486582870425e5542428d0e21e9e7ELSA-2019-4732ol5_ia64_latest
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.ia64.rpmf1f80ee7eb5f0efacbfb525aed7c89f084d43496e1743bebac25c0722ebc350b-el5_u5_ia64_patch
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.ia64.rpmf1f80ee7eb5f0efacbfb525aed7c89f084d43496e1743bebac25c0722ebc350b-ol5_ia64_latest
ocfs2-2.6.18-194.17.1.0.1.el5debug-1.4.7-1.el5.ia64.rpm299952de04c899bd4159bf4c581d2df00cb5e0759552f01fc43e07869c8c808c-el5_u5_ia64_patch
ocfs2-2.6.18-194.17.1.0.1.el5debug-1.4.7-1.el5.ia64.rpm299952de04c899bd4159bf4c581d2df00cb5e0759552f01fc43e07869c8c808c-ol5_ia64_latest
ocfs2-2.6.18-194.17.1.0.1.el5xen-1.4.7-1.el5.ia64.rpm44aef8339ada29ae7e6459f95e708972b24265d08eaeb5868e3e7d05694f8103-el5_u5_ia64_patch
ocfs2-2.6.18-194.17.1.0.1.el5xen-1.4.7-1.el5.ia64.rpm44aef8339ada29ae7e6459f95e708972b24265d08eaeb5868e3e7d05694f8103-ol5_ia64_latest
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.ia64.rpmaa32ae153ff40e99ce3ac9a75a107f25316a5cf219d64ff78f41dffffcfe1513-el5_u5_ia64_patch
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.ia64.rpmaa32ae153ff40e99ce3ac9a75a107f25316a5cf219d64ff78f41dffffcfe1513-ol5_ia64_latest
oracleasm-2.6.18-194.17.1.0.1.el5debug-2.0.5-1.el5.ia64.rpmf8c4fe34e3f9556a7364c18c474c80d11b72209b8fa7d05b5a94de6a6c8cc6a6-el5_u5_ia64_patch
oracleasm-2.6.18-194.17.1.0.1.el5debug-2.0.5-1.el5.ia64.rpmf8c4fe34e3f9556a7364c18c474c80d11b72209b8fa7d05b5a94de6a6c8cc6a6-ol5_ia64_latest
oracleasm-2.6.18-194.17.1.0.1.el5xen-2.0.5-1.el5.ia64.rpmb1c4d87b3ca2f7fb900b66573f1a8391ed6b487c205b67772a3766d8ff02ff9e-el5_u5_ia64_patch
oracleasm-2.6.18-194.17.1.0.1.el5xen-2.0.5-1.el5.ia64.rpmb1c4d87b3ca2f7fb900b66573f1a8391ed6b487c205b67772a3766d8ff02ff9e-ol5_ia64_latest
Oracle Linux 5 (x86_64) kernel-2.6.18-194.17.1.0.1.el5.src.rpmb6e422440bf67b7c0c23bc9a66591e759eaf2334a1a0e7555fc5617ef718345aELSA-2019-4732el5_u5_x86_64_patch
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.src.rpmb894c214b57bac69531adbe6056d137654d938f17dfecc80f39614b843eea4b0-el5_u5_x86_64_patch
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.src.rpm1227bb5d91d458fae65a2f2e6bbf9433d902d7ebae00557fbe88865eb6ae1e65-el5_u5_x86_64_patch
kernel-2.6.18-194.17.1.0.1.el5.x86_64.rpm40824174442e2fdb5e4b700bb9eb2c670370ae87fc10e90915f053ff7b826c8cELSA-2019-4732el5_u5_x86_64_patch
kernel-debug-2.6.18-194.17.1.0.1.el5.x86_64.rpmc5edec728e966700b919a184a363205622b7089aecaa03dcd69996b1fc2c51a2ELSA-2019-4732el5_u5_x86_64_patch
kernel-debug-devel-2.6.18-194.17.1.0.1.el5.x86_64.rpm62ecd7e5731566216c3f3eb79f66ac35ac39a1117ef0f56ad913c981ed0cb69eELSA-2019-4732el5_u5_x86_64_patch
kernel-devel-2.6.18-194.17.1.0.1.el5.x86_64.rpmd11196b1a86efd6d8ff52614a5bb92f869c4df1f4ad5ef2cdc00b9a8ca8cc4d0ELSA-2019-4732el5_u5_x86_64_patch
kernel-doc-2.6.18-194.17.1.0.1.el5.noarch.rpmc57454f07317f57a3bc7a991e494356c8922a8461c090e007c47e727d5bf971eELSA-2019-4732el5_u5_x86_64_patch
kernel-headers-2.6.18-194.17.1.0.1.el5.x86_64.rpmf5f400f2ca5573aeeb9224ddc3b95c40f8e2b99d24bd3d4d35872c005189fd64ELSA-2019-4732el5_u5_x86_64_patch
kernel-xen-2.6.18-194.17.1.0.1.el5.x86_64.rpm1c54f3f5090b302d8c989c6c4061e5986e0655bcb30f780174e0bd8e0aaede9aELSA-2019-4732el5_u5_x86_64_patch
kernel-xen-devel-2.6.18-194.17.1.0.1.el5.x86_64.rpm7b8c392c851c2a45cebc58a4654648f5aeef9ed3bf0d04cfc6736d5401799f62ELSA-2019-4732el5_u5_x86_64_patch
ocfs2-2.6.18-194.17.1.0.1.el5-1.4.7-1.el5.x86_64.rpm6184d6e809524c2432667c112b056897beee3b40ec6befe7b7e81ac73488f15f-el5_u5_x86_64_patch
ocfs2-2.6.18-194.17.1.0.1.el5debug-1.4.7-1.el5.x86_64.rpme533ecfcc999871f8cc78e7179b11eb6eb3d58d5614d0260d7d2f25cdb8b57d4-el5_u5_x86_64_patch
ocfs2-2.6.18-194.17.1.0.1.el5xen-1.4.7-1.el5.x86_64.rpm2a28ca208e65f40401280418096cdd6b5a519483eac0e9e4a91cf92a4b2da9f5-el5_u5_x86_64_patch
oracleasm-2.6.18-194.17.1.0.1.el5-2.0.5-1.el5.x86_64.rpm0548dfc4bb1aa6e1c8e13314f13f69bfbefa32a11fc80f039f5f056fe0f247a8-el5_u5_x86_64_patch
oracleasm-2.6.18-194.17.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm89d95c4ba62842cb3982d9d622ea70600158a60cb91c2e7a15b07e06c814e113-el5_u5_x86_64_patch
oracleasm-2.6.18-194.17.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm6f7c885581d8dc81989b2a51bf553c3501d4aaf72c9c313a66cb6c61d85fcbd8-el5_u5_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete