Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0275

Опубликовано: 20 мая 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0275: kernel security and bug fix update (IMPORTANT)

[2.6.18-53.1.21.0.1.el5]

  • [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [ORA 6045759]
  • [NET] Fix msi issue with kexec/kdump (Michael Chan) [ORA 6219364]
  • [MM] Fix alloc_pages_node() static 'nid' race made kernel crash (Joe Jin) [ORA 6187457]
  • [splice] Fix bad unlock_page() in error case (Jens Axboe) [ORA 6263574]
  • [dio] fix error-path crashes (Linux Torvalds) [ORA 6242289]

[2.6.18-53.1.21.el5]

  • [misc] infinite loop in highres timers (Michal Schmidt ) [440001]
  • [video] PWC driver DoS (Pete Zaitcev ) [308521]
  • [x86_64] fix unprivileged crash on %cs corruption (Jarod Wilson ) [439787]
  • [net] ESP: ensure IV is in linear part of the skb (Thomas Graf ) [427247]
  • [cpufreq] booting with maxcpus=1 panics (Doug Chapman ) [429516]
  • [net] sunrpc: lockd recovery is broken (Steve Dickson ) [445360]
  • [cpufreq] don't take sem in cpufreq_quick_get (Doug Chapman ) [400821]
  • [cpufreq] remove hotplug cpu cruft (Doug Chapman ) [400821]
  • [cpufreq] governor: use new rwsem locking in work cb (Doug Chapman ) [400821]
  • [cpufreq] ondemand governor restructure the work cb (Doug Chapman ) [400821]
  • [cpufreq] rewrite lock to eliminate hotplug issues (Doug Chapman ) [400821]

[2.6.18-53.1.20.el5]

  • [misc] fix softlockup warnings/crashes (Chris Lalancette ) [444402]

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel

2.6.18-53.1.21.0.1.el5

kernel-debug

2.6.18-53.1.21.0.1.el5

kernel-debug-devel

2.6.18-53.1.21.0.1.el5

kernel-devel

2.6.18-53.1.21.0.1.el5

kernel-doc

2.6.18-53.1.21.0.1.el5

kernel-headers

2.6.18-53.1.21.0.1.el5

kernel-xen

2.6.18-53.1.21.0.1.el5

kernel-xen-devel

2.6.18-53.1.21.0.1.el5

ocfs2-2.6.18-53.1.21.0.1.el5

1.2.8-2.el5

ocfs2-2.6.18-53.1.21.0.1.el5debug

1.2.8-2.el5

ocfs2-2.6.18-53.1.21.0.1.el5xen

1.2.8-2.el5

oracleasm-2.6.18-53.1.21.0.1.el5

2.0.4-1.el5

oracleasm-2.6.18-53.1.21.0.1.el5debug

2.0.4-1.el5

oracleasm-2.6.18-53.1.21.0.1.el5xen

2.0.4-1.el5

Oracle Linux i386

kernel

2.6.18-53.1.21.0.1.el5

kernel-PAE

2.6.18-53.1.21.0.1.el5

kernel-PAE-devel

2.6.18-53.1.21.0.1.el5

kernel-debug

2.6.18-53.1.21.0.1.el5

kernel-debug-devel

2.6.18-53.1.21.0.1.el5

kernel-devel

2.6.18-53.1.21.0.1.el5

kernel-doc

2.6.18-53.1.21.0.1.el5

kernel-headers

2.6.18-53.1.21.0.1.el5

kernel-xen

2.6.18-53.1.21.0.1.el5

kernel-xen-devel

2.6.18-53.1.21.0.1.el5

ocfs2-2.6.18-53.1.21.0.1.el5

1.2.8-2.el5

ocfs2-2.6.18-53.1.21.0.1.el5PAE

1.2.8-2.el5

ocfs2-2.6.18-53.1.21.0.1.el5debug

1.2.8-2.el5

ocfs2-2.6.18-53.1.21.0.1.el5xen

1.2.8-2.el5

oracleasm-2.6.18-53.1.21.0.1.el5

2.0.4-1.el5

oracleasm-2.6.18-53.1.21.0.1.el5PAE

2.0.4-1.el5

oracleasm-2.6.18-53.1.21.0.1.el5debug

2.0.4-1.el5

oracleasm-2.6.18-53.1.21.0.1.el5xen

2.0.4-1.el5

Связанные уязвимости

ubuntu
около 17 лет назад

The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.

redhat
больше 17 лет назад

The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.

nvd
около 17 лет назад

The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.

debian
около 17 лет назад

The IPsec implementation in Linux kernel before 2.6.25 allows remote r ...

github
около 3 лет назад

The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.