Описание
ELSA-2008-0612: kernel security and bug fix update (IMPORTANT)
[2.6.18-92.1.10.0.1.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]
- [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]
- [NET] fix netpoll race (Tina Yang) [orabugz 5791]
[2.6.18-92.1.10.el5]
- [ia64] softlock: prevent endless warnings in kdump (Neil Horman ) [456117 453200]
[2.6.18-92.1.9.el5]
- [misc] signaling msgrvc() should not pass back error (Jiri Pirko ) [455278 452533]
- [ia64] properly unregister legacy interrupts (Prarit Bhargava ) [450337 445886]
[2.6.18-92.1.8.el5]
- [net] randomize udp port allocation (Eugene Teo ) [454571 454572]
- [tty] add NULL pointer checks (Aristeu Rozanski ) [453425 453154] {CVE-2008-2812}
- [net] sctp: make sure sctp_addr does not overflow (David S. Miller ) [452482 452483] {CVE-2008-2826}
- [sys] sys_setrlimit: prevent setting RLIMIT_CPU to 0 (Neil Horman ) [437121 437122] {CVE-2008-1294}
- [net] sit: exploitable remote memory leak (Jiri Pirko ) [446038 446039] {CVE-2008-2136}
- [misc] ttyS1 lost interrupt, stops transmitting v2 (Brian Maly ) [455256 451157]
- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]
[2.6.18-92.1.7.el5]
- [x86_64]: extend MCE banks support for Dunnington, Nehalem (Prarit Bhargava ) [451941 446673]
- [nfs] address nfs rewrite performance regression in RHEL5 (Eric Sandeen ) [448685 436004]
- [mm] Make mmap() with PROT_WRITE on RHEL5 (Larry Woodman ) [450758 448978]
- [i386]: Add check for supported_cpus in powernow_k8 driver (Prarit Bhargava ) [450866 443853]
- [i386]: Add check for dmi_data in powernow_k8 driver (Prarit Bhargava ) [450866 443853]
- [net] fix recv return zero (Thomas Graf ) [452231 435657]
- [misc] kernel crashes on futex (Anton Arapov ) [450336 435178]
- [net] Fixing bonding rtnl_lock screwups (Fabio Olive Leite ) [451939 450219]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-92.1.10.0.1.el5
kernel-debug
2.6.18-92.1.10.0.1.el5
kernel-debug-devel
2.6.18-92.1.10.0.1.el5
kernel-devel
2.6.18-92.1.10.0.1.el5
kernel-doc
2.6.18-92.1.10.0.1.el5
kernel-headers
2.6.18-92.1.10.0.1.el5
kernel-xen
2.6.18-92.1.10.0.1.el5
kernel-xen-devel
2.6.18-92.1.10.0.1.el5
ocfs2-2.6.18-92.1.10.0.1.el5
1.2.9-1.el5
ocfs2-2.6.18-92.1.10.0.1.el5debug
1.2.9-1.el5
ocfs2-2.6.18-92.1.10.0.1.el5xen
1.2.9-1.el5
oracleasm-2.6.18-92.1.10.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-92.1.10.0.1.el5debug
2.0.4-1.el5
oracleasm-2.6.18-92.1.10.0.1.el5xen
2.0.4-1.el5
Oracle Linux i386
kernel
2.6.18-92.1.10.0.1.el5
kernel-PAE
2.6.18-92.1.10.0.1.el5
kernel-PAE-devel
2.6.18-92.1.10.0.1.el5
kernel-debug
2.6.18-92.1.10.0.1.el5
kernel-debug-devel
2.6.18-92.1.10.0.1.el5
kernel-devel
2.6.18-92.1.10.0.1.el5
kernel-doc
2.6.18-92.1.10.0.1.el5
kernel-headers
2.6.18-92.1.10.0.1.el5
kernel-xen
2.6.18-92.1.10.0.1.el5
kernel-xen-devel
2.6.18-92.1.10.0.1.el5
ocfs2-2.6.18-92.1.10.0.1.el5
1.2.9-1.el5
ocfs2-2.6.18-92.1.10.0.1.el5PAE
1.2.9-1.el5
ocfs2-2.6.18-92.1.10.0.1.el5debug
1.2.9-1.el5
ocfs2-2.6.18-92.1.10.0.1.el5xen
1.2.9-1.el5
oracleasm-2.6.18-92.1.10.0.1.el5
2.0.4-1.el5
oracleasm-2.6.18-92.1.10.0.1.el5PAE
2.0.4-1.el5
oracleasm-2.6.18-92.1.10.0.1.el5debug
2.0.4-1.el5
oracleasm-2.6.18-92.1.10.0.1.el5xen
2.0.4-1.el5
Связанные CVE
Связанные уязвимости
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
Linux kernel 2.6.17, and other versions before 2.6.22, does not check ...
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.