Описание
ELSA-2007-0993: Important: kernel security update (IMPORTANT)
- CVE-2007-4571 ALSA memory disclosure flaw
- Tick divider bugs on x86_64
- CVE-2007-5494 open(O_ATOMICLOOKUP) leaks dentry
- [PATCH] jbd: wait for already submitted t_sync_datalist buffer to complete (Possibility of in-place data destruction)
- LSPP: audit rule causes kernel 'out of memory' condition and auditd failure
- [EL5][BUG] Unexpected SIGILL on NFS/Montecito(ia64)
- task->mm or slab corruption with CIFS
- CVE-2007-4997 kernel ieee80211 off-by-two integer underflow
- LSPP: audit enable not picking up all processes
- [Broadcom 5.1.z bug] Performance regression on 5705 TG3 NICs
- LTC35628-kexec/kdump kernel hung on Power5+ and Power6 based systems
- LTC38135-vSCSI client reports 'Device sdX not ready' after deactive/active device on vSCSI server
- forcedeth driver mishandles MSI interrupts under high load
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-53.1.4.0.1.el5
kernel-debug
2.6.18-53.1.4.0.1.el5
kernel-debug-devel
2.6.18-53.1.4.0.1.el5
kernel-devel
2.6.18-53.1.4.0.1.el5
kernel-headers
2.6.18-53.1.4.0.1.el5
kernel-xen
2.6.18-53.1.4.0.1.el5
kernel-xen-devel
2.6.18-53.1.4.0.1.el5
Oracle Linux i386
kernel
2.6.18-53.1.4.0.1.el5
kernel-PAE
2.6.18-53.1.4.0.1.el5
kernel-PAE-devel
2.6.18-53.1.4.0.1.el5
kernel-debug
2.6.18-53.1.4.0.1.el5
kernel-debug-devel
2.6.18-53.1.4.0.1.el5
kernel-devel
2.6.18-53.1.4.0.1.el5
kernel-headers
2.6.18-53.1.4.0.1.el5
kernel-xen
2.6.18-53.1.4.0.1.el5
kernel-xen-devel
2.6.18-53.1.4.0.1.el5
Связанные CVE
Связанные уязвимости
Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat ...
Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."