Описание
ELSA-2007-0376: Important: kernel security and bug fix update (IMPORTANT)
[2.6.18-8.1.6.0.1.el5] -Fix bonding primary=ethX so it picks correct network (Bert Barbe) [IT 101532] [ORA 5136660] -Add entropy module option to e1000 (John Sobecki) [ORA 6045759] -Add entropy module option to bnx2 (John Sobecki) [ORA 6045759]
[2.6.18.8-1.6.el5]
- [bluetooth] close information leaks in setsockopt (Marcel Holtmann ) [241862]{CVE-2007-1353}
- [net] fix memory leak in PPPoE (Neil Horman ) [241863] {CVE-2007-2525}
- [random] fix seeding of dev/random (Aristeu Rozanski ) [241888]
[2.6.18-8.1.5.el5]
- [fs] prevent oops in compat_sys_mount (Jeff Layton ) [240456] {CVE-2006-7203}
- [e1000] fix watchdog timeout panics (Andy Gospodarek ) [238048]
- [ext3] return ENOENT from ext3_link when racing with unlink (Eric Sandeen ) [239787]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-8.1.6.0.1.el5
kernel-devel
2.6.18-8.1.6.0.1.el5
kernel-doc
2.6.18-8.1.6.0.1.el5
kernel-headers
2.6.18-8.1.6.0.1.el5
kernel-xen
2.6.18-8.1.6.0.1.el5
kernel-xen-devel
2.6.18-8.1.6.0.1.el5
ocfs2-2.6.18-8.1.6.0.1.el5
1.2.6-1.el5
ocfs2-2.6.18-8.1.6.0.1.el5xen
1.2.6-1.el5
oracleasm-2.6.18-8.1.6.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-8.1.6.0.1.el5xen
2.0.4-1.el5
Oracle Linux i386
kernel
2.6.18-8.1.6.0.1.el5
kernel-PAE
2.6.18-8.1.6.0.1.el5
kernel-PAE-devel
2.6.18-8.1.6.0.1.el5
kernel-devel
2.6.18-8.1.6.0.1.el5
kernel-doc
2.6.18-8.1.6.0.1.el5
kernel-headers
2.6.18-8.1.6.0.1.el5
kernel-xen
2.6.18-8.1.6.0.1.el5
kernel-xen-devel
2.6.18-8.1.6.0.1.el5
ocfs2-2.6.18-8.1.6.0.1.el5
1.2.6-1.el5
ocfs2-2.6.18-8.1.6.0.1.el5PAE
1.2.6-1.el5
ocfs2-2.6.18-8.1.6.0.1.el5xen
1.2.6-1.el5
oracleasm-2.6.18-8.1.6.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-8.1.6.0.1.el5PAE
2.0.4-1.el5
oracleasm-2.6.18-8.1.6.0.1.el5xen
2.0.4-1.el5
Связанные CVE
Связанные уязвимости
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
The setsockopt function in the L2CAP and HCI Bluetooth support in the ...
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.