Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0519

Опубликовано: 26 июн. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0519: kernel security and bug fix update (IMPORTANT)

[2.6.18-92.1.6.0.2.el5]

  • [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
  • [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]
  • [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]
  • [NET] fix netpoll race (Tina Yang) [orabugz 5791]

[2.6.18-92.1.6.el5]

  • [x86] sanity checking for read_tsc on i386 (Brian Maly ) [447686 443435]

[2.6.18-92.1.5.el5]

  • [x86_64] copy_user doesn't zero tail bytes on page fault (Vitaly Mayatskikh) [451275 451276] {CVE-2008-2729}

[2.6.18-92.1.4.el5]

  • Revert: [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]

[2.6.18-92.1.3.el5]

  • [x86_64] fix possible data leaks in copy_from_user() routine (Anton Arapov ) [433944 433945] {CVE-2008-0598}

[2.6.18-92.1.2.el5]

  • [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]
  • [net] DCCP sanity check feature length (Anton Arapov ) [447395 447396] {CVE-2008-2358}
  • [misc] fix possible buffer overflow in ASN.1 parsing routine (Anton Arapov ) [444464 444465] {CVE-2008-1673}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel

2.6.18-92.1.6.0.2.el5

kernel-debug

2.6.18-92.1.6.0.2.el5

kernel-debug-devel

2.6.18-92.1.6.0.2.el5

kernel-devel

2.6.18-92.1.6.0.2.el5

kernel-doc

2.6.18-92.1.6.0.2.el5

kernel-headers

2.6.18-92.1.6.0.2.el5

kernel-xen

2.6.18-92.1.6.0.2.el5

kernel-xen-devel

2.6.18-92.1.6.0.2.el5

ocfs2-2.6.18-92.1.6.0.2.el5

1.2.9-1.el5

ocfs2-2.6.18-92.1.6.0.2.el5debug

1.2.9-1.el5

ocfs2-2.6.18-92.1.6.0.2.el5xen

1.2.9-1.el5

oracleasm-2.6.18-92.1.6.0.2.el5

2.0.4-1.el5

oracleasm-2.6.18-92.1.6.0.2.el5debug

2.0.4-1.el5

oracleasm-2.6.18-92.1.6.0.2.el5xen

2.0.4-1.el5

Oracle Linux i386

kernel

2.6.18-92.1.6.0.2.el5

kernel-PAE

2.6.18-92.1.6.0.2.el5

kernel-PAE-devel

2.6.18-92.1.6.0.2.el5

kernel-debug

2.6.18-92.1.6.0.2.el5

kernel-debug-devel

2.6.18-92.1.6.0.2.el5

kernel-devel

2.6.18-92.1.6.0.2.el5

kernel-doc

2.6.18-92.1.6.0.2.el5

kernel-headers

2.6.18-92.1.6.0.2.el5

kernel-xen

2.6.18-92.1.6.0.2.el5

kernel-xen-devel

2.6.18-92.1.6.0.2.el5

ocfs2-2.6.18-92.1.6.0.2.el5

1.2.9-1.el5

ocfs2-2.6.18-92.1.6.0.2.el5PAE

1.2.9-1.el5

ocfs2-2.6.18-92.1.6.0.2.el5debug

1.2.9-1.el5

ocfs2-2.6.18-92.1.6.0.2.el5xen

1.2.9-1.el5

oracleasm-2.6.18-92.1.6.0.2.el5

2.0.4-1.el5

oracleasm-2.6.18-92.1.6.0.2.el5PAE

2.0.4-1.el5

oracleasm-2.6.18-92.1.6.0.2.el5debug

2.0.4-1.el5

oracleasm-2.6.18-92.1.6.0.2.el5xen

2.0.4-1.el5

Связанные уязвимости

ubuntu
около 17 лет назад

Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.

redhat
около 17 лет назад

Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.

nvd
около 17 лет назад

Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.

debian
около 17 лет назад

Integer overflow in the dccp_feat_change function in net/dccp/feat.c i ...

github
около 3 лет назад

Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.