Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2011-04-07 |
[2.6.32-71.24.1.el6]
- [fs] Revert '[fs] inotify: stop kernel memory leak on file creation failure' (Eric Paris) [656831 656832] {CVE-2010-4250}
[2.6.32-71.23.1.el6]
- [x86] Revert '[x86] mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs' (Frank Arnold) [683813 652208]
[2.6.32-71.22.1.el6]
- rebuild
[2.6.32-71.21.1.el6]
- [netdrv] ixgbe: limit VF access to network traffic (Frantisek Hrbata) [684129 678717]
- [netdrv] ixgbe: work around for DDP last buffer size (Frantisek Hrbata) [684129 678717]
- [net] gro: reset dev and skb_iff on skb reuse (Andy Gospodarek) [688311 681970]
- [x86] mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs (Frank Arnold) [683813 652208]
- [virt] virtio_net: Add schedule check to napi_enable call (Michael S. Tsirkin) [684268 676579]
- [s390x] mm: add devmem_is_allowed() for STRICT_DEVMEM checking (Hendrik Brueckner) [684267 647365]
- [powerpc] Don't use kernel stack with translation off (Steve Best) [684266 628951]
- [powerpc] Initialise paca->kstack before early_setup_secondary (Steve Best) [684266 628951]
[2.6.32-71.20.1.el6]
- [dvb] kernel: av7110 negative array offset (Mauro Carvalho Chehab) [672403 672404] {CVE-2011-0521}
- [fs] sunrpc: Correct a misapplied patch (J. Bruce Fields) [678094 678146] {CVE-2011-0714}
- [netdrv] orinoco: fix TKIP countermeasure behaviour (Stanislaw Gruszka) [667908 667909] {CVE-2010-4648}
- [kernel] /proc/vmcore: speed up access to vmcore file (Neil Horman) [683442 672937]
- [netdrv] cnic: Fix big endian bug (Steve Best) [678484 676640]
- [scsi] fcoe: drop FCoE LOGO in FIP mode (Mike Christie) [683814 668114]
- [s390x] remove task_show_regs (Danny Feng) [677854 677855] {CVE-2011-0710}
- [ib] cm: Bump reference count on cm_id before invoking callback (Doug Ledford) [676190 676191] {CVE-2011-0695}
- [rdma] cm: Fix crash in request handlers (Doug Ledford) [676190 676191] {CVE-2011-0695}
- [net] bridge: Fix mglist corruption that leads to memory corruption (Herbert Xu) [678172 659421] {CVE-2011-0716}
- [netdrv] r8169: use RxFIFO overflow workaround and prevent RxFIFO induced infinite loops (Ivan Vecera) [680080 630810]
- [s390x] kernel: nohz vs cpu hotplug system hang (Hendrik Brueckner) [683815 668470]
- [netdrv] cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory (Doug Ledford) [633156 633157] {CVE-2010-3296}
- [configs] redhat: added CONFIG_SECURITY_DMESG_RESTRICT option (Frantisek Hrbata) [683822 653245]
- [kernel] restrict unprivileged access to kernel syslog (Frantisek Hrbata) [683822 653245]
- [fs] cifs: allow matching of tcp sessions in CifsNew state (Jeff Layton) [683812 629085]
- [fs] cifs: fix potential double put of TCP session reference (Jeff Layton) [683812 629085]
- [fs] cifs: prevent possible memory corruption in cifs_demultiplex_thread (Jeff Layton) [683812 629085]
- [fs] cifs: eliminate some more premature cifsd exits (Jeff Layton) [683812 629085]
- [fs] cifs: prevent cifsd from exiting prematurely (Jeff Layton) [683812 629085]
- [fs] CIFS: Make cifs_convert_address() take a const src pointer and a length (Jeff Layton) [683812 629085]
- [kdump] kexec: accelerate vmcore copies by marking oldmem in /proc/vmcore as cached (Neil Horman) [683445 641315]
- [virt] KVM: VMX: Disallow NMI while blocked by STI (Avi Kivity) [683783 616296]
- [virt] kvm: write protect memory after slot swap (Michael S. Tsirkin) [683781 647367]
[2.6.32-71.19.1.el6]
- [crypto] sha-s390: Reset index after processing partial block (Herbert Xu) [678996 626515]
- [net] clear heap allocations for privileged ethtool actions (Jiri Pirko) [672434 672435] {CVE-2010-4655}
- [usb] iowarrior: don't trust report_size for buffer size (Don Zickus) [672421 672422] {CVE-2010-4656}
- [virt] virtio: console: Wake up outvq on host notifications (Amit Shah) [678558 643750]
- [fs] inotify: stop kernel memory leak on file creation failure (Eric Paris) [656831 656832] {CVE-2010-4250}
- [net] sctp: fix kernel panic resulting from mishandling of icmp dest unreachable msg (Neil Horman) [667028 667029] {CVE-2010-4526}
- [mm] install_special_mapping skips security_file_mmap check (Frantisek Hrbata) [662198 662199] {CVE-2010-4346}
- [kdump] vt-d: Handle previous faults after enabling fault handling (Takao Indoh) [678485 617137]
- [kdump] Enable the intr-remap fault handling after local apic setup (Takao Indoh) [678485 617137]
- [kdump] vt-d: Fix the vt-d fault handling irq migration in the x2apic mode (Takao Indoh) [678485 617137]
- [kdump] vt-d: Quirk for masking vtd spec errors to platform error handling logic (Takao Indoh) [678485 617137]
- [virt] virtio: console: Don't block entire guest if host doesn't read data (Amit Shah) [678562 643751]
- [virt] virtio: console: Prevent userspace from submitting NULL buffers (Amit Shah) [678559 635535]
- [virt] virtio: console: Fix poll blocking even though there is data to read (Amit Shah) [678561 634232]
CVE-2010-4526 |
CVE-2011-0521 |
CVE-2011-0716 |
CVE-2010-4656 |
CVE-2011-0710 |
CVE-2010-4346 |
CVE-2010-4648 |
CVE-2011-0695 |
CVE-2011-1478 |
CVE-2010-4655 |
CVE-2010-3296 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 6 (i386) | kernel-2.6.32-71.24.1.el6.src.rpm | 44150dcf9c4453f73ef79155d3e0494c6387c39107546b9299af195d28989089 | ELSA-2024-1831 | ol6_ga_i386_patch |
kernel-2.6.32-71.24.1.el6.src.rpm | 44150dcf9c4453f73ef79155d3e0494c6387c39107546b9299af195d28989089 | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-2.6.32-71.24.1.el6.i686.rpm | 90cd04952f2fe98b166e8cb295d8f0d8c2bfdf2e5eba1bb2d6469857a13711fa | ELSA-2024-1831 | ol6_ga_i386_patch | |
kernel-2.6.32-71.24.1.el6.i686.rpm | 90cd04952f2fe98b166e8cb295d8f0d8c2bfdf2e5eba1bb2d6469857a13711fa | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-debug-2.6.32-71.24.1.el6.i686.rpm | d03a740c8fd0be6416f522ab3bfd9026df4b848f9e4cd3f21951c6a63aa949da | ELSA-2024-1831 | ol6_ga_i386_patch | |
kernel-debug-2.6.32-71.24.1.el6.i686.rpm | d03a740c8fd0be6416f522ab3bfd9026df4b848f9e4cd3f21951c6a63aa949da | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm | c11a5a301309bdd0a9ed0520ae38832abeb51e4db96213ac05d95af74ec96a91 | ELSA-2024-1831 | ol6_ga_i386_patch | |
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm | c11a5a301309bdd0a9ed0520ae38832abeb51e4db96213ac05d95af74ec96a91 | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-devel-2.6.32-71.24.1.el6.i686.rpm | 7a22a08a095156fa12c2a55e78a03e8d41d79a2a218db9614476a7f799487485 | ELSA-2024-1831 | ol6_ga_i386_patch | |
kernel-devel-2.6.32-71.24.1.el6.i686.rpm | 7a22a08a095156fa12c2a55e78a03e8d41d79a2a218db9614476a7f799487485 | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm | d1caf8efe631049a18479ae87e4d7d7651d8001fae906b7d8d45a43a79f36afb | ELSA-2024-1831 | ol6_ga_i386_patch | |
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm | d1caf8efe631049a18479ae87e4d7d7651d8001fae906b7d8d45a43a79f36afb | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm | 45c9d4cd2eefa69cf418dacc7100204b59d6caecf4bde2f7e480bf626b3587ce | ELSA-2024-1831 | ol6_ga_i386_patch | |
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm | 45c9d4cd2eefa69cf418dacc7100204b59d6caecf4bde2f7e480bf626b3587ce | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-headers-2.6.32-71.24.1.el6.i686.rpm | 133f9be596c0d42c44644ca2a1cf239b9369d7c0450b7e84413bce614c1b8f85 | ELSA-2024-1831 | ol6_ga_i386_patch | |
kernel-headers-2.6.32-71.24.1.el6.i686.rpm | 133f9be596c0d42c44644ca2a1cf239b9369d7c0450b7e84413bce614c1b8f85 | ELSA-2024-1831 | ol6_i386_latest_archive | |
perf-2.6.32-71.24.1.el6.noarch.rpm | ad93e3d0396431163c810060501b80d47dd4123f8d1c6cd0e15bafc9975eb775 | ELSA-2024-1831 | ol6_ga_i386_patch | |
perf-2.6.32-71.24.1.el6.noarch.rpm | ad93e3d0396431163c810060501b80d47dd4123f8d1c6cd0e15bafc9975eb775 | ELSA-2024-1831 | ol6_i386_latest_archive | |
Oracle Linux 6 (x86_64) | kernel-2.6.32-71.24.1.el6.src.rpm | 44150dcf9c4453f73ef79155d3e0494c6387c39107546b9299af195d28989089 | ELSA-2024-1831 | ol6_ga_x86_64_patch |
kernel-2.6.32-71.24.1.el6.src.rpm | 44150dcf9c4453f73ef79155d3e0494c6387c39107546b9299af195d28989089 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-2.6.32-71.24.1.el6.x86_64.rpm | 49ebe644d0b22849979bde3c13f5da2e6cfafb9d15d53690d873d38d2251042d | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
kernel-2.6.32-71.24.1.el6.x86_64.rpm | 49ebe644d0b22849979bde3c13f5da2e6cfafb9d15d53690d873d38d2251042d | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm | e0495199cb1e7d97984425f87a2b04c174fd583218375795b113cc53080c4b76 | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm | e0495199cb1e7d97984425f87a2b04c174fd583218375795b113cc53080c4b76 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm | e4d69239b90d6880e56e2638b16135dd1313489727013c916fd967772a1920a5 | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm | e4d69239b90d6880e56e2638b16135dd1313489727013c916fd967772a1920a5 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm | 93d3713a38acb8755e83ad10158d64eaca81d3f220468d181d974ecfd5b43dcc | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm | 93d3713a38acb8755e83ad10158d64eaca81d3f220468d181d974ecfd5b43dcc | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm | d1caf8efe631049a18479ae87e4d7d7651d8001fae906b7d8d45a43a79f36afb | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm | d1caf8efe631049a18479ae87e4d7d7651d8001fae906b7d8d45a43a79f36afb | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm | 45c9d4cd2eefa69cf418dacc7100204b59d6caecf4bde2f7e480bf626b3587ce | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm | 45c9d4cd2eefa69cf418dacc7100204b59d6caecf4bde2f7e480bf626b3587ce | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm | ba99492642cbbce1c8d43e91dc70e85bfbfdd33aeb5ebfa6d30fee2ee280e505 | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm | ba99492642cbbce1c8d43e91dc70e85bfbfdd33aeb5ebfa6d30fee2ee280e505 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
perf-2.6.32-71.24.1.el6.noarch.rpm | ad93e3d0396431163c810060501b80d47dd4123f8d1c6cd0e15bafc9975eb775 | ELSA-2024-1831 | ol6_ga_x86_64_patch | |
perf-2.6.32-71.24.1.el6.noarch.rpm | ad93e3d0396431163c810060501b80d47dd4123f8d1c6cd0e15bafc9975eb775 | ELSA-2024-1831 | ol6_x86_64_latest_archive |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team