Описание
ELSA-2009-0326: kernel security and bug fix update (IMPORTANT)
[2.6.18-128.1.6.0.1.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki,Guru Anbalagane) [orabug 6045759]
- [MM] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- [NET] Add xen pv/bonding netconsole support (Tina yang) [orabug 6993043] [bz 7258]
- [nfs] convert ENETUNREACH to ENOTCONN (Guru Anbalagane) [orabug 7689332]
- [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
- [MM] balloon code needs to adjust totalhigh_pages (Chuck Anderson) [orabug 8300888]
[2.6.18-128.1.6.el5]
- [x86] add nonstop_tsc flag in /proc/cpuinfo (Luming Yu ) [489310 474091]
[2.6.18-128.1.5.el5]
- Revert: [x86_64] fix gettimeoday TSC overflow issue (Prarit Bhargava ) [489847 467942]
[2.6.18-128.1.4.el5]
- [x86_64] mce: do not clear an unrecoverable error status (Aristeu Rozanski ) [490433 489692]
- [wireless] iwlwifi: booting with RF-kill switch enabled (John W. Linville ) [489846 482990]
- [x86_64] fix gettimeoday TSC overflow issue (Prarit Bhargava ) [489847 467942]
- [misc] signal: modify locking to handle large loads (AMEET M. PARANJAPE ) [489457 487376]
- [x86] TSC keeps running in C3+ (Luming Yu ) [489310 474091]
- [net] fix icmp_send and icmpv6_send host re-lookup code (Jiri Pirko ) [489253 439670] {CVE-2009-0778}
[2.6.18-128.1.3.el5]
- [net] skfp_ioctl inverted logic flaw (Eugene Teo ) [486539 486540] {CVE-2009-0675}
- [net] memory disclosure in SO_BSDCOMPAT gsopt (Eugene Teo ) [486517 486518] {CVE-2009-0676}
- [x86] limit max_cstate to use TSC on some platforms (Tony Camuso ) [488239 470572]
- [ptrace] correctly handle ptrace_update return value (Jerome Marchand ) [487394 483814]
- [misc] minor signal handling vulnerability (Oleg Nesterov ) [479963 479964] {CVE-2009-0028}
- [firmware] dell_rbu: prevent oops (Don Howard ) [482941 482942]
- [gfs2] panic in debugfs_remove when unmounting (Abhijith Das ) [485910 483617]
[2.6.18-128.1.2.el5]
- [scsi] libata: sas_ata fixup sas_sata_ops (David Milburn ) [485909 483171]
- [fs] ecryptfs: readlink flaw (Eric Sandeen ) [481606 481607] {CVE-2009-0269}
- [qla2xxx] correct endianness during flash manipulation (Marcus Barrow ) [485908 481691]
- [net] ixgbe: frame reception and ring parameter issues (Andy Gospodarek ) [483210 475625]
- [misc] fix memory leak during pipe failure (Benjamin Marzinski ) [481576 478643]
- [block] enforce a minimum SG_IO timeout (Eugene Teo ) [475405 475406] {CVE-2008-5700}
- [nfs] handle attribute timeout and u32 jiffies wrap (Jeff Layton ) [483201 460133]
- [fs] ext[234]: directory corruption DoS (Eugene Teo ) [459601 459604] {CVE-2008-3528}
- [net] deadlock in Hierarchical token bucket scheduler (Neil Horman ) [481746 474797]
- [wireless] iwl: fix BUG_ON in driver (Neil Horman ) [483206 477671]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel
2.6.18-128.1.6.0.1.el5
kernel-debug
2.6.18-128.1.6.0.1.el5
kernel-debug-devel
2.6.18-128.1.6.0.1.el5
kernel-devel
2.6.18-128.1.6.0.1.el5
kernel-doc
2.6.18-128.1.6.0.1.el5
kernel-headers
2.6.18-128.1.6.0.1.el5
kernel-xen
2.6.18-128.1.6.0.1.el5
kernel-xen-devel
2.6.18-128.1.6.0.1.el5
ocfs2-2.6.18-128.1.6.0.1.el5
1.2.9-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5
1.4.1-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5debug
1.2.9-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5debug
1.4.1-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5xen
1.2.9-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5xen
1.4.1-1.el5
oracleasm-2.6.18-128.1.6.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-128.1.6.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-128.1.6.0.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-128.1.6.0.1.el5
kernel-PAE
2.6.18-128.1.6.0.1.el5
kernel-PAE-devel
2.6.18-128.1.6.0.1.el5
kernel-debug
2.6.18-128.1.6.0.1.el5
kernel-debug-devel
2.6.18-128.1.6.0.1.el5
kernel-devel
2.6.18-128.1.6.0.1.el5
kernel-doc
2.6.18-128.1.6.0.1.el5
kernel-headers
2.6.18-128.1.6.0.1.el5
kernel-xen
2.6.18-128.1.6.0.1.el5
kernel-xen-devel
2.6.18-128.1.6.0.1.el5
ocfs2-2.6.18-128.1.6.0.1.el5
1.2.9-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5
1.4.1-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5PAE
1.2.9-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5PAE
1.4.1-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5debug
1.2.9-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5debug
1.4.1-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5xen
1.2.9-1.el5
ocfs2-2.6.18-128.1.6.0.1.el5xen
1.4.1-1.el5
oracleasm-2.6.18-128.1.6.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-128.1.6.0.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-128.1.6.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-128.1.6.0.1.el5xen
2.0.5-1.el5
Ссылки на источники
Связанные уязвимости
The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir->i_size and dir->i_blocks values and performing (a) read or (b) write operations. NOTE: there are limited scenarios in which this crosses privilege boundaries.
The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir->i_size and dir->i_blocks values and performing (a) read or (b) write operations. NOTE: there are limited scenarios in which this crosses privilege boundaries.
The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir->i_size and dir->i_blocks values and performing (a) read or (b) write operations. NOTE: there are limited scenarios in which this crosses privilege boundaries.
The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/di ...
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.