ELSA-2018-4036

ELSA-2018-4036 - kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2018-02-21

Description


kernel
[2.6.18-419.0.0.0.5]
- [fs] fix kernel panic on boot on ia64 guests (Honglei Wang) [orabug 26934100]

[2.6.18-419.0.0.0.4]
- [fs] fix bug in loading of PIE binaries (Michael Davidson) [orabug 26916951] {CVE-2017-1000253}


Related CVEs


CVE-2017-1000253

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (ia64) kernel-2.6.18-419.0.0.0.5.el5.src.rpm49b220d3ef2a32d9b54a43c55a5368b7-
ocfs2-2.6.18-419.0.0.0.5.el5-1.4.11-1.el5.src.rpm0b1e1195cdd2a016f93716698a25229a-
oracleasm-2.6.18-419.0.0.0.5.el5-2.0.5-2.el5.src.rpmf85f6558007f1d99b769ae6a811ae2b4-
kernel-2.6.18-419.0.0.0.5.el5.ia64.rpm6f2639911a086744f5e9d284189373e8ELSA-2019-4732
kernel-debug-2.6.18-419.0.0.0.5.el5.ia64.rpmaff86d530efe3e05d460cdc822c2d528ELSA-2019-4732
kernel-debug-devel-2.6.18-419.0.0.0.5.el5.ia64.rpm11baa4278ac4cc7bc07278f85cf29282ELSA-2019-4732
kernel-devel-2.6.18-419.0.0.0.5.el5.ia64.rpm289b5cab1208d706d9e9f3c24efb87d8ELSA-2019-4732
kernel-doc-2.6.18-419.0.0.0.5.el5.noarch.rpm614400ac8425c4774b649597f23e2bbe-
kernel-headers-2.6.18-419.0.0.0.5.el5.ia64.rpm23720250931f28143184b4b493a094fdELSA-2019-4732
kernel-xen-2.6.18-419.0.0.0.5.el5.ia64.rpm0917f4177ffce3d2281af9885202fa12ELSA-2019-4732
kernel-xen-devel-2.6.18-419.0.0.0.5.el5.ia64.rpm8a9158a74208f865b54c655993824a7fELSA-2019-4732
ocfs2-2.6.18-419.0.0.0.5.el5-1.4.11-1.el5.ia64.rpmc7367cc5ac51e7ea238f474c9fe5c172-
ocfs2-2.6.18-419.0.0.0.5.el5debug-1.4.11-1.el5.ia64.rpm565cc1c999fdd24840edb58e7a76c2e2-
ocfs2-2.6.18-419.0.0.0.5.el5xen-1.4.11-1.el5.ia64.rpm8114cc7049361c2c563b035494bd98de-
oracleasm-2.6.18-419.0.0.0.5.el5-2.0.5-2.el5.ia64.rpmfda98e9ae20c9a9403d3696b362fbe22-
oracleasm-2.6.18-419.0.0.0.5.el5debug-2.0.5-2.el5.ia64.rpm273e870c14aea95aa88331a133456f22-
oracleasm-2.6.18-419.0.0.0.5.el5xen-2.0.5-2.el5.ia64.rpm5d12e773a0103d7f35024630943cd96d-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete