Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0376

Опубликовано: 26 июн. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0376: Important: kernel security and bug fix update (IMPORTANT)

[2.6.18-8.1.6.0.1.el5] -Fix bonding primary=ethX so it picks correct network (Bert Barbe) [IT 101532] [ORA 5136660] -Add entropy module option to e1000 (John Sobecki) [ORA 6045759] -Add entropy module option to bnx2 (John Sobecki) [ORA 6045759]

[2.6.18.8-1.6.el5]

  • [bluetooth] close information leaks in setsockopt (Marcel Holtmann ) [241862]{CVE-2007-1353}
  • [net] fix memory leak in PPPoE (Neil Horman ) [241863] {CVE-2007-2525}
  • [random] fix seeding of dev/random (Aristeu Rozanski ) [241888]

[2.6.18-8.1.5.el5]

  • [fs] prevent oops in compat_sys_mount (Jeff Layton ) [240456] {CVE-2006-7203}
  • [e1000] fix watchdog timeout panics (Andy Gospodarek ) [238048]
  • [ext3] return ENOENT from ext3_link when racing with unlink (Eric Sandeen ) [239787]

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel

2.6.18-8.1.6.0.1.el5

kernel-devel

2.6.18-8.1.6.0.1.el5

kernel-doc

2.6.18-8.1.6.0.1.el5

kernel-headers

2.6.18-8.1.6.0.1.el5

kernel-xen

2.6.18-8.1.6.0.1.el5

kernel-xen-devel

2.6.18-8.1.6.0.1.el5

ocfs2-2.6.18-8.1.6.0.1.el5

1.2.6-1.el5

ocfs2-2.6.18-8.1.6.0.1.el5xen

1.2.6-1.el5

oracleasm-2.6.18-8.1.6.0.1.el5

2.0.4-1.el5

oracleasm-2.6.18-8.1.6.0.1.el5xen

2.0.4-1.el5

Oracle Linux i386

kernel

2.6.18-8.1.6.0.1.el5

kernel-PAE

2.6.18-8.1.6.0.1.el5

kernel-PAE-devel

2.6.18-8.1.6.0.1.el5

kernel-devel

2.6.18-8.1.6.0.1.el5

kernel-doc

2.6.18-8.1.6.0.1.el5

kernel-headers

2.6.18-8.1.6.0.1.el5

kernel-xen

2.6.18-8.1.6.0.1.el5

kernel-xen-devel

2.6.18-8.1.6.0.1.el5

ocfs2-2.6.18-8.1.6.0.1.el5

1.2.6-1.el5

ocfs2-2.6.18-8.1.6.0.1.el5PAE

1.2.6-1.el5

ocfs2-2.6.18-8.1.6.0.1.el5xen

1.2.6-1.el5

oracleasm-2.6.18-8.1.6.0.1.el5

2.0.4-1.el5

oracleasm-2.6.18-8.1.6.0.1.el5PAE

2.0.4-1.el5

oracleasm-2.6.18-8.1.6.0.1.el5xen

2.0.4-1.el5

Связанные уязвимости

ubuntu
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

redhat
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

nvd
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

debian
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the ...

github
больше 3 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.