Описание
ELSA-2008-0519: kernel security and bug fix update (IMPORTANT)
[2.6.18-92.1.6.0.2.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]
- [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]
- [NET] fix netpoll race (Tina Yang) [orabugz 5791]
[2.6.18-92.1.6.el5]
- [x86] sanity checking for read_tsc on i386 (Brian Maly ) [447686 443435]
[2.6.18-92.1.5.el5]
- [x86_64] copy_user doesn't zero tail bytes on page fault (Vitaly Mayatskikh) [451275 451276] {CVE-2008-2729}
[2.6.18-92.1.4.el5]
- Revert: [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]
[2.6.18-92.1.3.el5]
- [x86_64] fix possible data leaks in copy_from_user() routine (Anton Arapov ) [433944 433945] {CVE-2008-0598}
[2.6.18-92.1.2.el5]
- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]
- [net] DCCP sanity check feature length (Anton Arapov ) [447395 447396] {CVE-2008-2358}
- [misc] fix possible buffer overflow in ASN.1 parsing routine (Anton Arapov ) [444464 444465] {CVE-2008-1673}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-92.1.6.0.2.el5
kernel-debug
2.6.18-92.1.6.0.2.el5
kernel-debug-devel
2.6.18-92.1.6.0.2.el5
kernel-devel
2.6.18-92.1.6.0.2.el5
kernel-doc
2.6.18-92.1.6.0.2.el5
kernel-headers
2.6.18-92.1.6.0.2.el5
kernel-xen
2.6.18-92.1.6.0.2.el5
kernel-xen-devel
2.6.18-92.1.6.0.2.el5
ocfs2-2.6.18-92.1.6.0.2.el5
1.2.9-1.el5
ocfs2-2.6.18-92.1.6.0.2.el5debug
1.2.9-1.el5
ocfs2-2.6.18-92.1.6.0.2.el5xen
1.2.9-1.el5
oracleasm-2.6.18-92.1.6.0.2.el5
2.0.4-1.el5
oracleasm-2.6.18-92.1.6.0.2.el5debug
2.0.4-1.el5
oracleasm-2.6.18-92.1.6.0.2.el5xen
2.0.4-1.el5
Oracle Linux i386
kernel
2.6.18-92.1.6.0.2.el5
kernel-PAE
2.6.18-92.1.6.0.2.el5
kernel-PAE-devel
2.6.18-92.1.6.0.2.el5
kernel-debug
2.6.18-92.1.6.0.2.el5
kernel-debug-devel
2.6.18-92.1.6.0.2.el5
kernel-devel
2.6.18-92.1.6.0.2.el5
kernel-doc
2.6.18-92.1.6.0.2.el5
kernel-headers
2.6.18-92.1.6.0.2.el5
kernel-xen
2.6.18-92.1.6.0.2.el5
kernel-xen-devel
2.6.18-92.1.6.0.2.el5
ocfs2-2.6.18-92.1.6.0.2.el5
1.2.9-1.el5
ocfs2-2.6.18-92.1.6.0.2.el5PAE
1.2.9-1.el5
ocfs2-2.6.18-92.1.6.0.2.el5debug
1.2.9-1.el5
ocfs2-2.6.18-92.1.6.0.2.el5xen
1.2.9-1.el5
oracleasm-2.6.18-92.1.6.0.2.el5
2.0.4-1.el5
oracleasm-2.6.18-92.1.6.0.2.el5PAE
2.0.4-1.el5
oracleasm-2.6.18-92.1.6.0.2.el5debug
2.0.4-1.el5
oracleasm-2.6.18-92.1.6.0.2.el5xen
2.0.4-1.el5
Связанные CVE
Связанные уязвимости
Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.
Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.
Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.
Integer overflow in the dccp_feat_change function in net/dccp/feat.c i ...
Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.