Описание
ELSA-2008-0089: Important: kernel security and bug fix update (IMPORTANT)
[2.6.18-53.1.6.0.1.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [ORA 6045759]
- [NET] Fix msi issue with kexec/kdump (Michael Chan) [ORA 6219364]
- [MM] Fix alloc_pages_node() static `nid' race made kernel crash (Joe Jin) [ORA 6187457]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [ORA 6263574]
- [dio] fix error-path crashes (Linux Torvalds) [ORA 6242289]
- [MM] Fix leak in hugepages, regression for shared pagetables patch (Adam Litke) [ORABUG 6732368]
[2.6.18-53.1.6.el5]
- [fs] corruption by unprivileged user in directories (Vitaly Mayatskikh ) [428796] {CVE-2008-0001}
[2.6.18-53.1.5.el5]
- [ia64] ptrace: access to user register backing (Roland McGrath ) [259801]
- [fs] cifs: buffer overflow due to corrupt response (Jeff Layton ) [372991]
- [net] s2io: correct VLAN frame reception (Andy Gospodarek ) [426289]
- [net] s2io: allow VLAN creation on interfaces (Andy Gospodarek ) [426289]
- [misc] tux: get rid of O_ATOMICLOOKUP (Michal Schmidt ) [426494]
- [x86_64] fix race conditions in setup_APIC_timer (Geoff Gustafson ) [424181]
- [fs] core dump file ownership (Don Howard ) [396991]
- [nfs] let rpciod finish sillyrename then umount (Steve Dickson ) [414041]
- [nfs] fix a race in silly rename (Steve Dickson ) [414041]
- [nfs] clean up the silly rename code (Steve Dickson ) [414041]
- [nfs] infrastructure changes for silly renames (Steve Dickson ) [414041]
- [nfs] introduce nfs_removeargs and nfs_removeres (Steve Dickson ) [414041]
- [ia64] remove stack hard limit (Aron Griffis ) [412091]
- [fs] sysfs: fix race condition around sd->s_dentry (Eric Sandeen ) [245777] {CVE-2007-3104}
- [fs] sysfs: fix condition check in sysfs_drop_dentry() (Eric Sandeen ) [245777] {CVE-2007-3104}
- [fs] sysfs: store inode nrs in s_ino (Eric Sandeen ) [245777] {CVE-2007-3104}
- [xen] ia64: vulnerability of copy_to_user in PAL emu (Jarod Wilson ) [425938]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-53.1.6.0.1.el5
kernel-debug
2.6.18-53.1.6.0.1.el5
kernel-debug-devel
2.6.18-53.1.6.0.1.el5
kernel-devel
2.6.18-53.1.6.0.1.el5
kernel-doc
2.6.18-53.1.6.0.1.el5
kernel-headers
2.6.18-53.1.6.0.1.el5
kernel-xen
2.6.18-53.1.6.0.1.el5
kernel-xen-devel
2.6.18-53.1.6.0.1.el5
ocfs2-2.6.18-53.1.6.0.1.el5
1.2.7-1.el5
ocfs2-2.6.18-53.1.6.0.1.el5xen
1.2.7-1.el5
oracleasm-2.6.18-53.1.6.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-53.1.6.0.1.el5xen
2.0.4-1.el5
Oracle Linux i386
kernel
2.6.18-53.1.6.0.1.el5
kernel-PAE
2.6.18-53.1.6.0.1.el5
kernel-PAE-devel
2.6.18-53.1.6.0.1.el5
kernel-debug
2.6.18-53.1.6.0.1.el5
kernel-debug-devel
2.6.18-53.1.6.0.1.el5
kernel-devel
2.6.18-53.1.6.0.1.el5
kernel-doc
2.6.18-53.1.6.0.1.el5
kernel-headers
2.6.18-53.1.6.0.1.el5
kernel-xen
2.6.18-53.1.6.0.1.el5
kernel-xen-devel
2.6.18-53.1.6.0.1.el5
ocfs2-2.6.18-53.1.6.0.1.el5
1.2.7-1.el5
ocfs2-2.6.18-53.1.6.0.1.el5PAE
1.2.7-1.el5
ocfs2-2.6.18-53.1.6.0.1.el5xen
1.2.7-1.el5
oracleasm-2.6.18-53.1.6.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-53.1.6.0.1.el5PAE
2.0.4-1.el5
oracleasm-2.6.18-53.1.6.0.1.el5xen
2.0.4-1.el5
Ссылки на источники
Связанные уязвимости
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earli ...
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.