Описание
ELSA-2008-0129: Important: kernel security update (IMPORTANT)
[2.6.18-53.1.13.0.1.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [NET] Fix msi issue with kexec/kdump (Michael Chan) [orabug 6219364]
- [MM] Fix alloc_pages_node() static `nid' race made kernel crash (Joe Jin) [orabug 6187457]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]
- [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]
- [MM] Fix leak in hugepages, regression for shared pagetables patch (Adam Litke) [orabug 6732368]
[2.6.18-53.1.13]
- revert to 2.6.18-53.1.6.el5
- [x86_64] kernel vmsplice_to_pipe flaw (Alexander Viro ) [432252] {CVE-2008-0600}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-53.1.13.0.1.el5
kernel-debug
2.6.18-53.1.13.0.1.el5
kernel-debug-devel
2.6.18-53.1.13.0.1.el5
kernel-devel
2.6.18-53.1.13.0.1.el5
kernel-doc
2.6.18-53.1.13.0.1.el5
kernel-headers
2.6.18-53.1.13.0.1.el5
kernel-xen
2.6.18-53.1.13.0.1.el5
kernel-xen-devel
2.6.18-53.1.13.0.1.el5
ocfs2-2.6.18-53.1.13.0.1.el5
1.2.8-2.el5
ocfs2-2.6.18-53.1.13.0.1.el5debug
1.2.8-2.el5
ocfs2-2.6.18-53.1.13.0.1.el5xen
1.2.8-2.el5
oracleasm-2.6.18-53.1.13.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-53.1.13.0.1.el5debug
2.0.4-1.el5
oracleasm-2.6.18-53.1.13.0.1.el5xen
2.0.4-1.el5
Oracle Linux i386
kernel
2.6.18-53.1.13.0.1.el5
kernel-PAE
2.6.18-53.1.13.0.1.el5
kernel-PAE-devel
2.6.18-53.1.13.0.1.el5
kernel-debug
2.6.18-53.1.13.0.1.el5
kernel-debug-devel
2.6.18-53.1.13.0.1.el5
kernel-devel
2.6.18-53.1.13.0.1.el5
kernel-doc
2.6.18-53.1.13.0.1.el5
kernel-headers
2.6.18-53.1.13.0.1.el5
kernel-xen
2.6.18-53.1.13.0.1.el5
kernel-xen-devel
2.6.18-53.1.13.0.1.el5
ocfs2-2.6.18-53.1.13.0.1.el5
1.2.8-2.el5
ocfs2-2.6.18-53.1.13.0.1.el5PAE
1.2.8-2.el5
ocfs2-2.6.18-53.1.13.0.1.el5debug
1.2.8-2.el5
ocfs2-2.6.18-53.1.13.0.1.el5xen
1.2.8-2.el5
oracleasm-2.6.18-53.1.13.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-53.1.13.0.1.el5PAE
2.0.4-1.el5
oracleasm-2.6.18-53.1.13.0.1.el5debug
2.0.4-1.el5
oracleasm-2.6.18-53.1.13.0.1.el5xen
2.0.4-1.el5
Связанные CVE
Связанные уязвимости
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 ...
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.