Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0129

Опубликовано: 13 фев. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0129: Important: kernel security update (IMPORTANT)

[2.6.18-53.1.13.0.1.el5]

  • [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
  • [NET] Fix msi issue with kexec/kdump (Michael Chan) [orabug 6219364]
  • [MM] Fix alloc_pages_node() static `nid' race made kernel crash (Joe Jin) [orabug 6187457]
  • [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]
  • [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]
  • [MM] Fix leak in hugepages, regression for shared pagetables patch (Adam Litke) [orabug 6732368]

[2.6.18-53.1.13]

  • revert to 2.6.18-53.1.6.el5
  • [x86_64] kernel vmsplice_to_pipe flaw (Alexander Viro ) [432252] {CVE-2008-0600}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel

2.6.18-53.1.13.0.1.el5

kernel-debug

2.6.18-53.1.13.0.1.el5

kernel-debug-devel

2.6.18-53.1.13.0.1.el5

kernel-devel

2.6.18-53.1.13.0.1.el5

kernel-doc

2.6.18-53.1.13.0.1.el5

kernel-headers

2.6.18-53.1.13.0.1.el5

kernel-xen

2.6.18-53.1.13.0.1.el5

kernel-xen-devel

2.6.18-53.1.13.0.1.el5

ocfs2-2.6.18-53.1.13.0.1.el5

1.2.8-2.el5

ocfs2-2.6.18-53.1.13.0.1.el5debug

1.2.8-2.el5

ocfs2-2.6.18-53.1.13.0.1.el5xen

1.2.8-2.el5

oracleasm-2.6.18-53.1.13.0.1.el5

2.0.4-1.el5

oracleasm-2.6.18-53.1.13.0.1.el5debug

2.0.4-1.el5

oracleasm-2.6.18-53.1.13.0.1.el5xen

2.0.4-1.el5

Oracle Linux i386

kernel

2.6.18-53.1.13.0.1.el5

kernel-PAE

2.6.18-53.1.13.0.1.el5

kernel-PAE-devel

2.6.18-53.1.13.0.1.el5

kernel-debug

2.6.18-53.1.13.0.1.el5

kernel-debug-devel

2.6.18-53.1.13.0.1.el5

kernel-devel

2.6.18-53.1.13.0.1.el5

kernel-doc

2.6.18-53.1.13.0.1.el5

kernel-headers

2.6.18-53.1.13.0.1.el5

kernel-xen

2.6.18-53.1.13.0.1.el5

kernel-xen-devel

2.6.18-53.1.13.0.1.el5

ocfs2-2.6.18-53.1.13.0.1.el5

1.2.8-2.el5

ocfs2-2.6.18-53.1.13.0.1.el5PAE

1.2.8-2.el5

ocfs2-2.6.18-53.1.13.0.1.el5debug

1.2.8-2.el5

ocfs2-2.6.18-53.1.13.0.1.el5xen

1.2.8-2.el5

oracleasm-2.6.18-53.1.13.0.1.el5

2.0.4-1.el5

oracleasm-2.6.18-53.1.13.0.1.el5PAE

2.0.4-1.el5

oracleasm-2.6.18-53.1.13.0.1.el5debug

2.0.4-1.el5

oracleasm-2.6.18-53.1.13.0.1.el5xen

2.0.4-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 17 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

redhat
больше 17 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

nvd
больше 17 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

debian
больше 17 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 ...

github
около 3 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.